docs-mintlify/admin/sso/okta/scim.mdx
Available on Enterprise plan.
</Note>Before proceeding, ensure you have the following:
Before configuring SCIM in Okta, you need to enable SCIM provisioning in Cube Cloud:
To allow Okta to communicate with Cube Cloud via SCIM, you'll need to create a dedicated API key:
This section assumes you already have a Cube Cloud SAML app integration in Okta. If you haven't created one yet, follow the SAML setup guide first.
/api/scim/v2 appended. For example:
https://your-deployment.cubecloud.dev/api/scim/v2userNameAfter saving the SCIM connection, configure which provisioning actions are enabled for your application:
For users and groups to be provisioned in Cube Cloud, you need to assign them to your Cube Cloud application in Okta. This is also required for group memberships to be correctly synchronized — pushing a group alone does not assign its members to the application.
If users were assigned to the application before SCIM provisioning was enabled, Okta will show the following message in the Assignments tab: "User was assigned this application before Provisioning was enabled and not provisioned in the downstream application. Click Provision User."
To resolve this, click Provision User next to each affected user. This will trigger SCIM provisioning for them without needing to remove and re-add their assignment.
</Warning>To synchronize groups from Okta to Cube Cloud, you need to select which groups to push:
Users created through SCIM receive the same default role configured for SAML auto-provisioning — there is no separate SCIM control. By default this is the Viewer role; to choose a different default role (including custom roles), see Default role for new users on the SAML setup page.
The default role only applies to users created by SCIM (POST /api/scim/v2/Users). Existing users are not modified by subsequent SCIM
profile or group updates.