Picture this: your build pipeline is fast, your teams are shipping daily, and suddenly someone leaves the company. Their credentials stay active in Drone because access management never caught up. That's how privilege creep quietly eats at security. Drone SCIM fixes that problem before it starts.
Drone CI handles continuous integration beautifully. It automates builds, runs tests, and ships artifacts with minimal fuss. But identity isn’t its strong suit. SCIM, the System for Cross‑domain Identity Management standard, solves that. It syncs users and groups automatically from your identity provider, such as Okta or Azure AD, into target systems like Drone. The result is consistent, governed access across your CI workflows.
When you integrate Drone with SCIM, you connect your IdP’s logic to Drone’s authorization model. Users are provisioned when they join the right group and deprovisioned when they leave. Permissions reflect real‑time organization state, not forgotten admin clicks. The integration also means audit logs line up across your stack, which simplifies SOC 2 and ISO 27001 reviews. No more spreadsheets of stale accounts.
The flow is straightforward: SCIM acts as the bridge. Your IdP exports identities through SCIM endpoints, Drone consumes them, and the platform updates roles accordingly. Most setups rely on OAuth or OIDC for authentication, then use SCIM for the maintenance that OAuth was never designed to handle. Think of it as identity plumbing that keeps your pipelines clean.
A quick way to troubleshoot mis‑syncs is to compare group mappings in the IdP with team roles in Drone. If users land in the wrong project scope, check the SCIM schema values. They should map to Drone’s role definitions, not arbitrary labels. Re‑syncing once usually aligns it. Running periodic SCIM discovery helps prevent drift.