Skip to main content

Set up SCIM EnterpriseEnterprise +

The System for Cross-Domain Identity Management (SCIM) makes user data more secure and simplifies the admin and end-user lifecycle experience by automating user identities and groups. You can create or disable user identities in your Identity Provider (IdP), and SCIM will automatically make those changes in near real-time downstream in dbt.

Prerequisites

To configure SCIM in your dbt environment:

Supported features

The currently available supported features for SCIM are:

  • User provisioning and de-provisioning
  • User profile updates
  • Group creation and management
  • Importing groups and users

When SCIM is enabled, the following functionality will change:

  • Users are not automatically added to default groups
  • Manual actions such as inviting users, updating user information and updating group memberships are disabled by default
  • SSO group mappings are disabled in favor of SCIM group management. Refer to Do SSO group mappings still apply when SCIM is enabled? for details.

To overwrite these updates to functionality with SCIM enabled, enable manual updates as part of the SCIM configuration (not recommended).

When users are provisioned, the following attributes are supported

  • Username
  • Family name
  • Given name

The following IdPs are supported in the dbt user interface:

If your IdP isn't on the list, it can be supported using dbt APIs.

Set up dbt

To retrieve the necessary dbt configurations for use in Okta or Entra ID:

  1. Navigate to your dbt Account settings.
  2. Under Settings, click SSO & SCIM.
  3. Scroll to the bottom of your SSO configuration settings and click Enable SCIM.
    SCIM enabled in the configuration settings.SCIM enabled in the configuration settings.
  4. Record the SCIM base URL field for use in a later step.
  5. Click Create SCIM token.
    note

    To follow best practices, you should regularly rotate your SCIM tokens. To do so, follow these same instructions you did to create a new one. To avoid service disruptions, remember to replace your token in your IdP before deleting the old token in dbt.

  6. In the pop-up window, give the token a name that will make it easily identifiable. Click Save.
    Give your token and identifier.Give your token and identifier.
  7. Copy the token and record it securely, as it will not be available again after you close the window. You must create a new token if you lose the current one.
    Give your token and identifier.Give your token and identifier.
  8. (Optional) Manual updates are turned off by default for all SCIM-managed entities, including the ability to invite new users manually. This ensures SCIM-managed entities stay in sync with the IdP, and we recommend keeping this setting disabled.
    • However, if you need to make manual updates (like update group membership for a SCIM-managed group), you can enable this setting by clicking Allow manual updates and confirming the Allow manual updates pop up. For more details on this setting, refer to What does "Allow manual updates" mean? in the SCIM FAQ.
    Enabling manual updates in SCIM settings.Enabling manual updates in SCIM settings.

Next steps

Configure SCIM for your identity provider and optionally manage licenses:

Was this page helpful?

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

0
Loading