Skip to content

SCIM 2.0

The SCIM 2.0 connector enables automatic provisioning of users and groups from your Identity Provider (IdP) into Big ACL’s Policy Information Point (PIP).

SCIM (System for Cross-domain Identity Management) is an open standard that allows Identity Providers like Azure AD/Entra ID, Okta, or Ping Identity to automatically synchronize user and group data with Big ACL.

Supported operations:

  • Create, update, and delete users
  • Create, update, and delete groups
  • Manage group memberships
  1. Navigate to Settings > Connectors
  2. Click New Connector
  3. Select SCIM 2.0 from the Identity Provider category
  4. Enter a name for your connector (e.g., “Azure AD Provisioning”)
  5. Click Save

Before activating the connector, you must configure how SCIM attributes map to your Big ACL entities.

  1. Go to the Mappings tab
  2. Configure User Mappings:
    • Select the target EntityClass for users (e.g., “Employee”)
    • Click Add Mapping to map SCIM attributes to entity fields
  3. Optionally configure Group Mappings following the same process
TypeDescription
Simple valueMaps the SCIM attribute directly to the field
ReferenceResolves the value to an existing entity reference
List of referencesMaps an array of values to entity references (e.g., group members)

User (Core Schema):

  • userName - Unique identifier
  • name.givenName - First name
  • name.familyName - Last name
  • emails[primary].value - Primary email
  • active - Account status

User (Enterprise Extension):

  • employeeNumber - Employee ID
  • department - Department name
  • manager.value - Manager reference

Group:

  • displayName - Group name
  • members[].value - Member references
  1. Go to the Configuration tab
  2. Click Generate Token
  3. Copy the token immediately - it will only be shown once
  4. Store the token securely

Warning: If you lose the token, you’ll need to generate a new one and update your IdP configuration.

  1. Open the connector menu (three dots icon)
  2. Click Activate

The connector is now ready to receive SCIM requests from your Identity Provider.

Use the following values to configure SCIM provisioning in your IdP:

SettingValue
Tenant URLhttps://api.big-acl.com/scim/v2/{tenant-id}
AuthenticationBearer Token
TokenThe token generated in Step 3
  1. Go to Enterprise Applications > Your App > Provisioning
  2. Set Provisioning Mode to Automatic
  3. Enter the Tenant URL and Secret Token
  4. Click Test Connection then Save
  5. Configure attribute mappings as needed
  6. Turn Provisioning Status to On
  1. Go to Applications > Your App > Provisioning
  2. Click Configure API Integration
  3. Enter the SCIM Base URL and API Token
  4. Enable the provisioning features you need
  5. Configure attribute mappings in the To App section

If you suspect the token has been compromised:

  1. Go to the Configuration tab
  2. Click Rotate Token
  3. Confirm the action
  4. Update your IdP with the new token

Note: The previous token is immediately invalidated. Your IdP will fail to connect until updated.

To temporarily stop provisioning:

  1. Open the connector menu
  2. Click Deactivate

The SCIM endpoint will reject all requests until reactivated.

To permanently remove the connector:

  1. Open the connector menu
  2. Click Delete
  3. Type DELETE to confirm

Note: Provisioned entities (users/groups) will NOT be deleted. Only the connector configuration and mappings are removed.

The History tab shows all SCIM operations received by the connector:

  • Filter by operation type (Create, Update, Delete, Search)
  • Filter by resource type (User, Group)
  • Filter by status (Success, Error)
  • Click on an error row to see details
  • Verify the Tenant URL is correct
  • Ensure the token is entered without extra spaces
  • Check that the connector is activated
  • Verify attribute mappings are configured
  • Check the History tab for errors
  • Ensure the IdP provisioning is enabled and users are in scope
  • The token may have been rotated or revoked
  • Generate a new token and update your IdP
  • The target EntityClass may have been deleted
  • Verify your mappings reference existing classes
MethodEndpointDescription
GET/UsersList/search users
GET/Users/{id}Get user by ID
POST/UsersCreate user
PUT/Users/{id}Replace user
PATCH/Users/{id}Update user
DELETE/Users/{id}Delete user
GET/GroupsList/search groups
GET/Groups/{id}Get group by ID
POST/GroupsCreate group
PUT/Groups/{id}Replace group
PATCH/Groups/{id}Update group
DELETE/Groups/{id}Delete group
  • urn:ietf:params:scim:schemas:core:2.0:User
  • urn:ietf:params:scim:schemas:extension:enterprise:2.0:User
  • urn:ietf:params:scim:schemas:core:2.0:Group