How to set up user provisioning with SCIM¶
Wire supports the SCIM (RFC 7643) protocol to create, update and delete users.
To set up the connection of your SCIM client (e.g. Azure Active Directory) you need to provide
The URL under which Wire’s SCIM API is hosted:
https://prod-nginz-https.wire.com/scim
. If you are hosting your own instance of Wire then the URL ishttps://<hostname>/scim
, where<hostname>
is where you are serving Wire’s public endpoints.A OAuth 2.0 Bearer Token which authorizes the use of the SCIM API. Use the wire_scim_token.py script to generate a token. To run the script you need access to an user account with “admin” privileges that can login via email and password.
You need to configure your SCIM client to use the following mandatory SCIM attributes:
Set the
userName
attribute to the desired user handle (the handle is shown with an @ prefix in apps). It must be unique accross the entire Wire Cloud (or unique on your own instance), and consist of the charactersa-z0-9_.-
(no capital letters).Set the
displayName
attribute to the user’s desired display name, e.g. “Jane Doe”. It must consist of 1-128 unicode characters. It does not need to be unique.The
externalId
attribute:If you are using Wire’s SAML SSO feature then set
externalId
attribute to the same identifier asNameID
in your SAML configuration.If this identifier is an email address, then you can optionally enable email validatation during provisioning by activating the
validateSAMLemails
feature flag.If you are using email/password authentication then set the
externalId
attribute to the user’s email address. The user will receive an invitation email during provisioning. Also note that the account will be set to"active": false
until the user has accepted the invitation and activated the account.
You can optionally make use of Wire’s urn:wire:scim:schemas:profile:1.0
extension field to store arbitrary user profile data. See docs for details.