Skip to main content

SCIM FAQs and troubleshooting EnterpriseEnterprise +

Find answers to common questions about configuring and using SCIM provisioning in dbt platform, plus guidance for resolving common issues.

FAQs

 Do the userName and email.value fields have to be the same value for SCIM to work?

Yes. Both must match the email address the user uses to sign in to dbt platform (email value on the user object in your IdP that's used to sign in). If they don't match, a validation error will occur during provisioning.

 Do SSO group mappings still apply when SCIM is enabled?

No. SSO group mappings do not apply to SCIM-managed users. For SCIM-managed users, group membership is controlled by your IdP.

SSO group mappings only apply to users who authenticate with SSO and are not SCIM-managed.

This means that if you have a dbt group with SSO mappings, those mappings will not be applied to users who have been provisioned through SCIM.

 What does "Allow manual updates" mean?

The Allow manual updates toggle determines whether admins can manually modify SCIM-managed users and groups in dbt platform, including sending invites.

  • Disabled (default): Your IdP remains the source of truth for SCIM-managed users and groups. Manual changes to SCIM-managed users in dbt platform are blocked. This is the recommended setting because any manual changes made while enabled can be overwritten by later SCIM updates.
  • Enabled: Admins can make manual changes to users in dbt platform alongside SCIM. This can be useful during initial setup and testing, but manual changes do not prevent SCIM from overriding them.
 What happens to existing users and groups when I enable SCIM?

Enabling SCIM does not automatically convert existing users and groups to SCIM-managed status. Your IdP only manages users who have been explicitly assigned to the app and provisioned through SCIM.

To bring existing users and groups under SCIM management, assign them to the dbt platform app in your IdP and trigger a sync. Until a user is provisioned through SCIM, they remain unmanaged and are unaffected by SCIM sync operations.

 What happens when a user's email address changes in my IdP when SCIM is enabled?

When a SCIM-managed user's email is updated in the IdP, dbt platform receives a SCIM request to update it. A confirmation email is sent to the new address, and once accepted, the change takes effect in dbt platform.

 Does SCIM support automatic license assignment?

SCIM license mapping is supported for Okta. It is not supported for Microsoft Entra ID. For Entra ID, use SSO license mapping

For Okta license mapping setup, refer to Manage user licenses with SCIM.

 Can I use Okta for SSO and Entra ID for SCIM (or vice versa)?

SSO and SCIM should be configured using the same IdP. Using different providers — for example, Okta for SSO and Entra ID for SCIM — can cause discrepancies in user state and unintended behavior.

If your organization uses separate IdPs for authentication and directory management, contact your account team to discuss your options.


Troubleshooting

 There is a "All users must have licenses on the account" error

This error occurs when a SCIM group push includes a user who hasn't been licensed in dbt platform yet — typically because they haven't accepted their invitation.

Steps to resolve:

  1. Identify the user(s) causing the error from your IdP's provisioning logs.
  2. Check whether those users have accepted their dbt platform invitation. Users are not licensed until they complete this step.
  3. Once the user accepts and signs in, retry the group push from your IdP.
  4. If the invitation has expired, remove the user from the push group temporarily, re-invite them using dbt platform, have them accept, then re-add them to the group.
 Existing users and groups are not becoming SCIM-managed after enabling SCIM

After enabling SCIM and completing the initial sync, pre-existing dbt platform users and groups do not show as SCIM-managed.

Why this happens: SCIM provisioning links an IdP identity to a dbt platform user record. Users created before SCIM was enabled don't have this link unless the IdP explicitly provisions them through SCIM.

Steps to resolve:

  1. In your IdP, assign existing users to the dbt platform SCIM application.
  2. Trigger a provisioning sync. The IdP will attempt to match users by their userName (typically their email address) and establish the SCIM-managed link.
    Entra ID note

    For Entra ID, note that the provisioning sync is one-way (push only) — there is no import option to pull existing dbt users into Entra as a managed identity.

  3. If users aren't being matched correctly after a sync, confirm that the userName and email.value attributes in your IdP exactly match the email on the user's dbt platform account, including case.
 Entra SCIM provisioning fails due to IP allowlisting

If your dbt platform account has IP restrictions enabled, Entra's SCIM provisioning requests may be blocked. Azure's provisioning service IPs rotate approximately every two weeks and can't be statically allowlisted.

Recommended approach:

  1. Filter to the AzureActiveDirectory service tag in Azure's published IP ranges JSON rather than allowlisting all Azure IPs.
  2. Use the dbt platform Admin API with a service token to update your IP allowlist on a schedule — for example, a weekly script that pulls the current AzureActiveDirectory ranges and updates your allowlist through the API.

Contact support@getdbt.com for guidance on using the Admin API for allowlist management.

Was this page helpful?

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

0
Loading