SCIM Provisioning
SCIM (System for Cross-domain Identity Management) lets your identity provider automatically manage users in CRA Evidence. When someone joins your company and is assigned to CRA Evidence in Okta or Azure AD, they're automatically provisioned. When they leave, they're automatically deprovisioned.
This feature is available on Enterprise plans.
How It Works
- You create a SCIM client in CRA Evidence and get a bearer token
- You configure your identity provider with our SCIM endpoint and the token
- When you assign users to CRA Evidence in your IdP, they're automatically created here
- When you remove users, they're automatically deactivated
No more manual user management. No more forgotten accounts after someone leaves.
Supported Identity Providers
CRA Evidence works with any SCIM 2.0-compliant identity provider, including:
- Okta
- Azure Active Directory (Microsoft Entra ID)
- Google Workspace
- OneLogin
- JumpCloud
If your IdP supports SCIM 2.0, it should work with CRA Evidence.
Setting Up SCIM
Step 1: Create a SCIM Client
Go to Settings > SCIM Provisioning and click "Add SCIM Client".
Enter a name for the client (e.g., "Okta Production"). If you've already configured SAML SSO with this IdP, you can optionally link them together for easier management.
Configure the provisioning settings:
Default Role determines what role new users get. Choose Member for people who need to create and edit products, or Viewer for read-only access.
Auto-activate controls whether new users can log in immediately. Enable this for seamless onboarding. Disable it if you want to manually approve each user.
Sync Attributes determines whether CRA Evidence updates user names and preferences when your IdP sends changes. Usually you want this enabled.
Click "Create Client". A bearer token appears on screen. Copy this token immediately and store it securely. This is the only time you'll see it.
Step 2: Configure Your Identity Provider
In your identity provider, find the SCIM provisioning settings for CRA Evidence. Each IdP is slightly different, but you'll need:
SCIM Endpoint:
https://app.craevidence.com/scim/v2
Authentication: Bearer Token
Token: Paste the token you copied in Step 1
Test the connection in your IdP to verify everything is working.
Step 3: Assign Users
In your IdP, assign users or groups to the CRA Evidence application. Within a few seconds, those users appear in your CRA Evidence organisation.
Managing SCIM Clients
Viewing Statistics
The SCIM settings page shows statistics for each client:
- Users created (total provisioned)
- Users updated (total sync operations)
- Users deactivated (total deprovisioned)
- Last sync time
Click on a client to see detailed provisioning logs.
Rotating Tokens
If you suspect a token has been compromised, or as part of regular security hygiene, you can rotate it:
- Go to Settings > SCIM Provisioning
- Click on the client
- Click "Rotate Token"
- Copy the new token immediately
- Update the token in your IdP
The old token stops working immediately, so update your IdP promptly to avoid provisioning interruptions.
Enabling and Disabling
You can temporarily disable a SCIM client without deleting it. This stops all provisioning from that IdP while you troubleshoot issues or make changes.
Deleting a Client
Deleting a SCIM client removes the connection entirely. Users already provisioned remain in CRA Evidence but won't receive further updates from the IdP. You'd need to manage them manually or create a new SCIM client.
Provisioning Behaviour
User Creation
When your IdP provisions a user:
- CRA Evidence checks if the email address already exists
- If new, creates the user with the default role you configured
- If auto-activate is enabled, user can log in immediately
- Logs the provisioning event
User Updates
When your IdP updates a user (name change, etc.):
- If sync attributes is enabled, CRA Evidence updates the user's profile
- The user's role isn't changed (roles are managed in CRA Evidence)
- Logs the update event
User Deactivation
When you remove someone from the CRA Evidence app in your IdP:
- CRA Evidence marks the user as inactive
- They can no longer log in
- Their data remains (for audit purposes)
- Logs the deactivation event
If you want to permanently delete users when they're removed from your IdP, enable the "Allow Deletion" option on the SCIM client. Use this with caution as it permanently removes user data.
Reactivation
If you re-assign someone to CRA Evidence in your IdP, they're automatically reactivated. Their previous data and access is restored.
Troubleshooting
Users Not Being Provisioned
Check these common issues:
- Token is correct. Copy it fresh from CRA Evidence and paste into your IdP
- SCIM client is enabled. Make sure it hasn't been disabled in CRA Evidence
- Users are assigned. In your IdP, verify users or groups are assigned to CRA Evidence
- No network issues. Your IdP must be able to reach app.craevidence.com
Look at the provisioning logs in your SCIM client detail page for specific error messages.
Users Can't Log In
If provisioned users can't log in:
- Auto-activate is disabled. Enable it, or manually activate users in Settings > Members
- User is deactivated. Check if they were previously deactivated
- SSO is enforced. If you enforce SSO, users must log in via your IdP, not with password
Token Stopped Working
If your IdP suddenly can't connect:
- Token was rotated. Check if someone rotated the token
- Client was disabled. Check if the SCIM client is enabled
- Client was deleted. Check if it still exists
If the token was rotated, get the new one from the SCIM client detail page.
Audit Trail
All SCIM operations are logged. Go to the SCIM client detail page to see:
- What operation occurred (create, update, deactivate)
- Which user was affected
- When it happened
- Whether it succeeded or failed
- Error details if it failed
These logs are retained for 10 years to meet CRA audit requirements.
Best Practices
Start with a test group. Before rolling out to everyone, provision a small test group and verify everything works.
Use auto-activate. Manual approval creates friction. Most organisations want seamless onboarding.
Rotate tokens periodically. Treat SCIM tokens like other credentials. Rotate them annually or when team members with access leave.
Link SSO and SCIM. If you're using both SAML SSO and SCIM from the same IdP, link them in CRA Evidence for easier management.
Monitor provisioning logs. Periodically check for failed operations that might indicate configuration issues.
Related Documentation
- Team Management for understanding roles
- Roles & Permissions for access levels
- Enterprise SSO guides for specific IdP setup
Help us improve. What was missing or unclear?