SCIM tokens¶
Reference: {#RefScimToken}
Author: Artyom Kazak
A SCIM token is a bearer token used to authorize SCIM operations.
A team owner can create SCIM tokens for the team. Each of those tokens can be used to provision new members to the team, modify members’ profile attributes, etc. Tokens have unlimited duration, but can be revoked.
Using a SCIM token¶
SCIM tokens are not general-purpose API tokens. They only apply to the /scim/v2/
subtree of the API.
SCIM tokens are intended to be used by provisioning tools, such as Okta, OneLogin, Active Directory, and so on. If you have your own provisioning utility, you can use a token by adding an Authorization
header to all /scim/v2/
requests:
A SCIM token identifies the team that the token belongs to, so you do not need to specify the team in the request.
API¶
Creating a token¶
Creating a token requires the user to be a team owner. As an additional precaution, we also require the user to re-enter their password.
There is a reasonable limit on the number of tokens a single team can have, set in scim.yaml
at maxScimTokens
. For Wire the limit is 16.
Sample request and response:
Note that SCIM can only be used with teams that have either no or exactly one SAML IdP (internal issue).
Listing existing tokens¶
Listing tokens requires the user to be a team owner.
We don’t ever send tokens themselves, only the metadata (which can be used, for instance, to decide which tokens to revoke).
Sample request and response:
Revoking a token¶
Revoking a token requires the user to be a team owner.
To revoke a token, the user has to provide the token ID (not the token itself). The revoked token becomes unused immediately and does not show up in the results of GET /scim/auth-tokens
.
Sample request and response: