The first time the spam bots flooded our system, the alerts didn’t stop for 19 hours.
We had a solid SCIM provisioning setup. Or so we thought. User accounts flowed in from our identity provider. Roles, groups, permissions—all automated. But no one asked what would happen if the system started creating accounts that shouldn’t exist. That’s how spam sneaks in. Not the email kind—worse. Fake users in your directory. Bloating your org chart. Polluting data. Triggering workflows.
SCIM provisioning without an anti-spam policy is a door left unlocked. It assumes your identity source is pure. It assumes bad data won’t flow downstream. That’s rarely true. External vendors, buggy scripts, compromised accounts—they all push data. Without validation, the provisioning system sees them as truth. Truth that replicates everywhere.
The foundation is simple. Always validate before you provision. You need pre-provisioning filters. Rules that reject suspicious accounts at the identity layer. Validation must run before your SCIM endpoints see a single payload. Every event from your IdP should be inspected: username format, email domain, group membership, creation source, even velocity of account creation. High velocity almost always means trouble.