server/priv/docs/en/guides/integrations/authentication/scim.md
Tuist supports SCIM 2.0 provisioning so an identity provider can create, update, and deprovision organization members automatically.
SCIM is configured from the Authentication tab in your organization settings. The SCIM token is an organization-owned account token scoped to SCIM access and is shown only once when generated.
[!NOTE] SCIM controls membership and lifecycle. It does not replace <.localized_link href="/guides/integrations/authentication/sso">Single Sign-On</.localized_link>. Configure SSO separately if provisioned users should also sign in through your identity provider.
Okta uses two separate applications for Tuist:
Configure <.localized_link href="/guides/integrations/authentication/sso#okta">Okta SSO</.localized_link> first if users should sign in with Okta, then configure SCIM provisioning with the steps below.
/scim/v2.Okta).Tuist SCIM.Bearer . For example, Bearer tuist_scim_.... Okta sends this field as the Authorization header, and Tuist expects a bearer token.To test deprovisioning, unassign or deactivate a user in Okta and verify that they disappear from the Tuist organization's Members tab.
When Okta assigns a user to the SCIM app, Tuist creates the user if the email is not already known to Tuist, then adds them to the organization. If the email already belongs to an existing Tuist user outside the organization, Tuist rejects the request to prevent an IdP from claiming a user that it does not already manage in that organization.
When Okta unassigns or deactivates the user, Tuist removes their organization role while preserving the user record and any work they own. Deprovisioning does not disable the user globally, because the same Tuist user can belong to other organizations.
Tuist exposes two synthetic SCIM groups: Admins and Users. Group membership changes from Okta map to organization roles in Tuist.
Tuist supports the SCIM 2.0 endpoints Okta needs for lifecycle management:
POST, GET, PUT, PATCH, and DELETE for /Users.GET and PATCH for /Groups./ServiceProviderConfig, /ResourceTypes, and /Schemas.