Skip to main content

SCIM Provisioning

SCIM (System for Cross-domain Identity Management) lets your identity provider automatically provision and deprovision Dacard accounts. When you add a user to your IdP group, they get a Dacard account. When you remove or deactivate them, their access is revoked immediately no manual steps required. SCIM is available on the Enterprise plan. Navigate to Settings > SCIM to see your endpoint details.

Supported operations

OperationWhat it does
Create userAutomatically provisions a new Dacard account when a user is added in your IdP
Deactivate userRevokes access when a user is deactivated or removed in your IdP
Update userSyncs name and email changes from your IdP to Dacard
Push groupsMaps IdP groups to Dacard roles (admin, lead, member)

SCIM endpoint

Your SCIM base URL is:
https://clerk.dacard.ai/scim/v2
Your bearer token is available after enterprise onboarding. Contact support@dacard.ai to retrieve it.
Never share your SCIM bearer token. Treat it like a password. If it is compromised, contact support immediately to rotate it.

Setup guide

SCIM is configured in your identity provider, not in the Dacard UI. The general process:
1

Contact support

Email support@dacard.ai to request your SCIM bearer token and provider-specific setup guide.
2

Add a SCIM app in your IdP

In your identity provider (Okta, Azure AD, etc.), create a new SCIM application. Enter the Dacard SCIM base URL and your bearer token.
3

Configure attribute mapping

Map IdP user attributes to SCIM standard fields: userName (email), name.givenName, name.familyName, and groups for role mapping.
4

Test provisioning

Assign a test user in your IdP and verify their Dacard account is created. Then deactivate the test user and verify access is revoked.
5

Go live

Assign your full user group. SCIM provisioning is active.

Role mapping via groups

Map IdP groups to Dacard roles using group push:
IdP group nameDacard role
dacard-adminsAdmin
dacard-leadsLead
dacard-membersMember
Group names can be customized during setup.

Provider-specific guides

Our team provides setup guides for:
  • Okta SCIM 2.0 app configuration with attribute mapping
  • Azure AD / Entra Enterprise application provisioning setup
  • Google Workspace Requires a third-party provisioning bridge
  • OneLogin SCIM provisioning with role synchronization
Contact support@dacard.ai and specify your IdP.

Requirements

RequirementDetail
PlanEnterprise
Bearer tokenProvided by Dacard support during onboarding
Setup timeTypically under 2 hours once you have the token

SSO

Pair SCIM provisioning with SSO for fully automated identity management.

Roles & Permissions

Understand Dacard roles before configuring group mapping.