Picture this: your data team spins up a new Redash workspace, half the org needs access, and suddenly you’re knee-deep in manual user provisioning. Someone forgot to remove the intern from last quarter, the finance lead can’t log in, and everyone blames SSO. Redash SCIM exists to make this pain disappear—if you wire it up correctly.
Redash handles analytics and dashboards. SCIM handles identity hygiene across cloud apps. When they cooperate, account creation and deactivation happen automatically, matching whatever groups live in your identity provider. It’s the difference between managing users by hand and letting policy manage them for you.
At a high level, Redash SCIM ties your identity provider—Okta, Azure AD, or OneLogin—directly to your Redash instance through a simple API pattern. The provider owns the record of truth. Redash only mirrors what the source tells it. That means no more CSV imports, no more quiet credential creep, and instant offboarding the moment someone leaves your company.
Here’s how the workflow plays out: the identity provider pushes user and group data over SCIM. Redash receives it, links those objects with existing roles, and updates them any time IDs change. You can map Redash roles to your corporate groups so an “AnalyticsAdmin” group in Okta automatically grants query-edit permissions. The system runs invisibly once set, and nothing is forgotten—or left lingering online.
If your SCIM sync stalls or drops users, start with the basics. Verify tokens in your identity provider, confirm endpoint URLs, and check audit logs on both sides. Redash errors usually surface in its admin UI under SCIM or Users. Most failures stem from mismatched group names or expired API secrets.