Picture this: you onboard a new engineer, add them to your identity provider, and expect every tool to grant the right access without lifting a finger. Then CircleCI asks for manual user management, and your dream of hands-off provisioning evaporates. This is exactly where CircleCI SCIM comes to the rescue.
CircleCI SCIM connects your organization’s identity provider—think Okta or Azure AD—to your CircleCI workspace. It automates user lifecycle events: new accounts, role updates, and clean removals when someone leaves. SCIM stands for System for Cross-domain Identity Management, but really, it means fewer spreadsheets and less time chasing stale access.
Here's the logic behind it. SCIM syncs user attributes directly to CircleCI through standard API calls defined by your IdP. When a user joins your Engineering group, CircleCI automatically provisions them with the right permissions. When they move teams or leave, the system de-provisions without human intervention. The result is a security model as boring as it should be—predictable and airtight.
How to connect CircleCI SCIM to your identity provider
Start in your IdP console. Enable SCIM provisioning and supply the CircleCI Base URL and token. CircleCI reads updates over SCIM and mirrors them into its internal RBAC roles. Keep the token stored in a secure vault, rotate it quarterly, and ensure your IdP attribute mappings match CircleCI’s expected fields like userName and displayName. That’s it. No custom scripts, no brittle webhooks.
Featured answer:
CircleCI SCIM automates account provisioning by syncing user data from an identity provider—such as Okta or Azure AD—into CircleCI. It eliminates manual access management and ensures consistent permissions as users join, move, or depart.