Skip to main content
SCIM provisioning settings

Introduction

SCIM (System for Cross-domain Identity Management) lets your identity provider automatically manage Rootly users and groups. When users are assigned or unassigned in your IdP, they are provisioned or deprovisioned in Rootly without any manual steps.
SCIM requires SSO to be configured first — the SCIM endpoint will not resolve until SSO setup is complete. SCIM and Google Directory Sync are also mutually exclusive and cannot both be active at the same time.

Before You Begin

Before connecting your IdP:
  1. Complete SSO setup for your organization
  2. Navigate to Integrations > SSO in Rootly and copy your SCIM Token — this is the Bearer token your IdP uses to authenticate SCIM requests
  3. Note your SCIM tenant URL: https://rootly.com/scim
Rootly supports the following SCIM 2.0 operations:
ResourceSupported Operations
UsersCreate, read, update (PUT/PATCH), deactivate, delete
GroupsCreate, read, update (PUT/PATCH), delete, member sync

Identity Provider Setup

Expand the section for your identity provider:

Enable SCIM provisioning

In Okta, navigate to Applications > Rootly > Provisioning tab. Under Settings > Integrations, click Configure API Integration, enter your SCIM Token, and save.
Okta SCIM API integration configuration

Enable Create and Deactivate users

Go to Provisioning > To App, click Edit, and enable:
  • Create Users — provisions users when assigned to the Rootly app
  • Deactivate Users — removes users from Rootly when unassigned
Ensure the Default username is set to email. If not, go to the Sign on tab, click Edit, and set Application username format to email under Credentials settings.

Push groups (optional)

To sync Okta Groups to Rootly:
  1. In Okta, navigate to Directory > Groups and create or select a group
  2. Go to Applications > Rootly > Push Groups tab
  3. Click +Push Groups, select the group, switch from Create Group to Link Group, and click Save
  4. In Rootly, go to Integrations > SSO > Role Assignment and map the Okta Group to a Rootly Role
Every user added to that Okta Group will be provisioned in Rootly with the associated role.
Follow the official Microsoft tutorial for configuring SCIM provisioning with Rootly:Microsoft Entra SCIM provisioning tutorial →
Google Workspace has limited native SCIM support. The following workaround uses Google’s Adobe app as a proxy for SCIM provisioning.

Add a new Web and Mobile app

In Google Admin Console, navigate to Apps > Web and mobile apps and click Add app.
Google Workspace add app

Select the Adobe app

Search for and select the Adobe app from the catalog.
Google Workspace Adobe app selection

Configure auto-provisioning

When prompted for SAML fields, enter https://dummy.com/saml for all values. When you reach the auto-provisioning step:
  • SCIM Token: your token from Rootly > Integrations > SSO
  • Endpoint URL: https://rootly.com/scim
  • Select a group of users to import, or leave empty to import all
Enable the application — sync will begin shortly.

Install the SCIM extension

Download the keycloak-scim JAR from the releases page, place it in /opt/keycloak/providers/, and restart Keycloak.

Add SCIM as an event listener

Go to Realm Settings > Events > Event Listeners and add scim to the list. Save.

Create a SCIM federation provider

Navigate to User Federation > Add provider > SCIM and configure:
FieldValue
UI display nameRootly
SCIM 2.0 endpointhttps://rootly.com/scim
Endpoint content typeapplication/scim+json
Auth modeBEARER
Auth password/tokenYour SCIM Token from Rootly
Set the environment variable SCIM_EMAIL_AS_USERNAME=true — this ensures usernames are sent in email format, required for user matching in Rootly.

Enable propagation

In the federation provider settings, enable:
  • Enable user propagation: On
  • Enable group propagation: On (optional)
  • Log SCIM requests and responses: On (recommended for debugging)
  • Import action: CREATE_LOCAL
Optionally enable Periodic full sync or Periodic changed users sync for regular synchronization.
Rippling supports SSO and SCIM provisioning for Rootly in a single step. Connect from the Rippling app store.

Supported Attributes

Users

SCIM AttributeRootly FieldNotes
userNameEmailRequired. Must be a valid email address.
name.givenNameFirst name
name.familyNameLast name
displayNamePreferred name
externalIdExternal IDStored per SSO account, not globally
activeMembership statusfalse removes the user’s team membership
emailsEmailPrimary work email
phoneNumbersPhone numbersAuto-verified on import; normalized with US as default country code

Groups

SCIM AttributeRootly FieldNotes
displayNameGroup name
externalIdExternal identifier
membersGroup membersUser and nested group types both accepted

Group Sync

SCIM groups pushed from your IdP can be synced to Rootly Groups. When enabled:
  • Create — a pushed SCIM group creates a corresponding Rootly Group, or links to an existing one with the same name
  • Rename — renaming a group in your IdP renames the linked Rootly Group
  • Members — adding or removing members from a SCIM group updates Rootly Group membership
The Sync SCIM groups to teams toggle must be enabled by Rootly support. Contact support@rootly.com to enable it. Once enabled, any groups already pushed before the toggle was turned on will be automatically backfilled.

Role Assignment via Groups

When Assign roles to SCIM groups is enabled, Rootly automatically assigns roles based on group membership. If a user belongs to multiple SCIM groups with different role configurations, the highest-weighted role is applied.

SCIM Logs

All SCIM operations are logged. Go to Integrations > SSO > SCIM Logs to view a history of provisioning requests including resource type, event type, request URL, response status, and full request/response bodies (encrypted at rest). Use this to diagnose provisioning failures or verify that operations from your IdP are reaching Rootly.

Troubleshooting

The SCIM endpoint only becomes active after SSO is fully configured. Complete SSO setup in Integrations > SSO and save before connecting your IdP’s SCIM provisioning. Confirm you are using https://rootly.com/scim with no trailing slash.
The IdP authenticates with your SCIM Token as a Bearer token. Retrieve the current token from Integrations > SSO in Rootly and confirm it matches what your IdP has configured. Also confirm that SCIM is enabled in your SSO settings.
Confirm that the user is assigned to the Rootly application in your IdP, the userName attribute is a valid email address, Create Users is enabled in your IdP’s provisioning settings, and the default username format is set to email. Check SCIM Logs for failed requests and their error details.
When a user is deactivated (active: false), Rootly removes their team membership but preserves the user record. If they still appear active, check SCIM Logs for a failed deactivation request.
Group sync requires the Sync SCIM groups to teams toggle to be enabled by Rootly support. If it’s not visible in your SSO settings, contact support@rootly.com. Also confirm group push is configured in your IdP.
Phone number sync is a feature-flagged capability. Contact support@rootly.com to confirm it is enabled for your organization. Numbers are normalized using US as the default country code — include a country code prefix for non-US numbers.

SSO

Configure SAML 2.0 single sign-on — required before enabling SCIM.

Google Directory Sync

Poll-based alternative to SCIM for Google Workspace organizations.

On-Call Schedules

Manage on-call schedules once users are provisioned via SCIM.