Someone joins your engineering team and waits two days to get access to dashboards. Someone leaves, and their credentials linger in the system for weeks. That’s how quietly identity drift starts. New Relic SCIM exists to keep that cleanup automatic, precise, and fast enough that you stop worrying about it.
System for Cross-domain Identity Management (SCIM) is a standard that syncs user identities between your identity provider and target applications. New Relic SCIM uses that protocol to manage groups, entitlements, and user lifecycle events inside your observability platform. It plugs into Okta, Azure AD, or any system that speaks SCIM, reducing human touchpoints while tightening audit control.
When configured right, New Relic SCIM updates users and teams whenever changes occur upstream. Assign a new engineer to a “web performance” group in Okta and SCIM automatically grants access to the same dashboards in New Relic. Offboard a contractor and SCIM removes their seat instantly, keeping your SOC 2 audit trail quiet. The logic is simple: map your identity attributes once and let the automation define who sees what.
New Relic SCIM works best when you treat it like a data integration, not a checkbox. Good mappings ensure consistency across global roles. Always align permissions with least privilege principles. Rotate tokens regularly and use short-lived secrets. If you see sync errors, check your identity provider’s pagination and endpoint throttling before blaming New Relic. Most issues trace back to stale attributes or misaligned schema extensions.
Featured Answer:
To set up New Relic SCIM, connect your identity provider (like Okta) to the SCIM endpoint provided by New Relic, authorize with an API token, and define user and group mappings that mirror existing access policies. SCIM then automates onboarding and offboarding across all observability resources.