Your headcount doubled last quarter, and now keeping access in sync feels like chasing a moving target. Someone joins an engineering team, someone else switches departments, and suddenly half your staging services are wide open. That is the exact mess Kuma SCIM was built to prevent.
Kuma SCIM connects identity providers like Okta or Azure AD with Kuma, the service mesh built on top of Envoy. SCIM stands for System for Cross-domain Identity Management, an open standard that automates user and group provisioning. Think of it as a protocol that keeps “who has access to what” consistent, even when people come and go. When integrated with Kuma, SCIM ensures every policy, service permission, and mTLS certificate remains attached to the right identity source, not a forgotten local config.
In practice, the setup works like this: your identity provider becomes the authority on users and groups, and Kuma consumes that data to drive RBAC policies at the mesh layer. When a user gets onboarded in Okta, SCIM tells Kuma to create the corresponding identity object. When they leave, SCIM deletes it automatically, cleaning up tokens and access rights instantly. That’s the key flow—identity events cascade into network enforcement without a human logging in to “clean up old accounts.”
Featured answer: Kuma SCIM is an integration pattern that synchronizes user and group data from your identity provider into Kuma’s service mesh, ensuring access control, audit consistency, and automatic deprovisioning across microservices.
To get it working right, map your identity groups directly to service policies. Avoid nested group nightmares. Rotate SCIM bearer tokens regularly just like any API key. And test your offboarding path first—it’s easier to debug why a deleted user still has live credentials than to patch a breach notice later.
Five real benefits of using Kuma SCIM: