Skip to main content

SCIM provisioning

SCIM (System for Cross-domain Identity Management) 2.0 is an open standard for automating user and group provisioning between identity providers and applications. With SCIM, your identity provider can automatically create, update, and deactivate staff accounts in ClassLark without manual intervention.

Benefits of SCIM

  • Automated user provisioning: New staff are automatically created when added to your identity provider
  • Automatic updates: Changes to staff details (name, email, role) sync automatically
  • Deprovisioning: Staff removed from your identity provider are automatically deactivated
  • Group management: Create staff groups in your identity provider and sync them to ClassLark
  • Reduced administrative overhead: No need to manually add or remove staff accounts

Before you begin

Requirements
  • SCIM provisioning requires technical setup by your IT staff
  • Your identity provider must support SCIM 2.0 (Azure AD, Okta, Google Workspace, OneLogin, etc.)
  • Single sign-on (SSO) should be configured first (see SSO documentation)
  • Staff and groups managed by SCIM cannot be edited manually. Any changes will need to be completed in your identity provider.

Setting up SCIM

Step 1: Request SCIM credentials

Contact our support team to request SCIM access for your account. We'll provide you with a unique API token that can be used to connect to the SCIM API.

Keep your token secure

Your API token provides full access to manage users and groups in your account. Store it securely and never share it publicly. If compromised, contact support immediately to revoke and regenerate the token.

Step 2: Configure your identity provider

Configure your identity provider's SCIM application with the following settings:

General settings

  • SCIM Base URL: https://api.classlark.com
  • Authentication: Bearer Token
  • Token: Use the API token provided by support
  • SCIM Version: 2.0

User attributes mapping

Map the following attributes from your identity provider to ClassLark:

Staff attributeSCIM attributeRequiredDescription
EmailuserNameYesStaff email address (must be unique)
First namename.givenNameYesStaff first name
Last namename.familyNameYesStaff last name
TypeuserTypeYesOne of: Staff, Event Manager, Finance Manager, Administrator
External IDexternalIdNoYour internal staff identifier
Role assignment

Map roles in your identity provider based on staff responsibilities. Most staff should be assigned the "Staff" role, with elevated permissions only for those who need them.

Additional fields for staff can also be managed by SCIM

Staff attributeSCIM attributeDescriptionExample
Subjectsurn:ietf:params:scim:schemas:extension:school-event-planner:2.0:User:subjectsTeaching subjects/areas"Mathematics, Physics"
Default roomurn:ietf:params:scim:schemas:extension:school-event-planner:2.0:User:roomRoom number/location"A113"
Default meeting URLurn:ietf:params:scim:schemas:extension:school-event-planner:2.0:User:meetingUrlVirtual meeting link"https://zoom.us/my/teacher"

Step 3: Configure group provisioning (optional)

If you want to sync staff groups from your identity provider:

  1. Enable group provisioning in your identity provider's SCIM settings
  2. Map the following attributes:
    • Display Name: Group name
    • Members: Group members

Groups in ClassLark can be used to create shared booking slots where multiple staff members share the same time slots.

Step 4: Test the integration

Before enabling automatic provisioning for all staff:

  1. Create a test user in your identity provider
  2. Assign them to the ClassLark SCIM application
  3. Verify the user appears in ClassLark under the Staff section
  4. Update the test user's details and verify changes sync
  5. Remove the test user and verify they're deactivated in ClassLark

Step 5: Enable provisioning

Once testing is successful:

  1. Assign existing staff to the SCIM application in your identity provider
  2. Enable automatic provisioning
  3. Monitor the initial sync to ensure all staff are created correctly

Troubleshooting

Users not syncing

  1. Verify the API token is correct and has not expired
  2. Check that users are assigned to the SCIM application in your identity provider
  3. Ensure required fields (email, first name, last name, userType) are mapped
  4. Check your identity provider's provisioning logs for errors

Duplicate user errors

If you receive duplicate user errors:

  • Ensure email addresses are unique across all staff
  • Consider using the externalId field to map existing users

Role mapping issues

Ensure the userType field maps exactly to one of:

  • Staff
  • Event Manager
  • Finance Manager
  • Administrator

Values are case-sensitive and must match exactly.

Groups not appearing

  1. Verify group provisioning is enabled in your identity provider
  2. Check that groups have members assigned
  3. Ensure the displayName attribute is mapped correctly

Disabling SCIM

If you need to disable SCIM provisioning, you can disable SCIM from within your identity provider, and contact our support team to revoke your API token.

info

Disabling SCIM will not remove existing staff accounts, but will still prevent manual changes to any staff or groups set up by SCIM. To edit these, contact our support team.

Need help?

If you encounter issues setting up SCIM or need assistance with your specific identity provider, contact our support team with:

  • your identity provider name and version
  • any error messages from provisioning logs

We'll work with you to ensure a smooth integration with your identity provider.