How to set up user provisioning with SCIM

Wire supports the SCIM (RFC 7643) protocol to create, update and delete users.

To set up the connection of your SCIM client (e.g. Azure Active Directory) you need to provide

  1. The URL under which Wire’s SCIM API is hosted: If you are hosting your own instance of Wire then the URL is https://<hostname>/scim, where <hostname> is where you are serving Wire’s public endpoints.

  2. A OAuth 2.0 Bearer Token which authorizes the use of the SCIM API. Use the script to generate a token. To run the script you need access to an user account with “admin” privileges that can login via email and password.

You need to configure your SCIM client to use the following mandatory SCIM attributes:

  1. Set the userName attribute to the desired user handle (the handle is shown with an @ prefix in apps). It must be unique accross the entire Wire Cloud (or unique on your own instance), and consist of the characters a-z0-9_.- (no capital letters).

  2. Set the displayName attribute to the user’s desired display name, e.g. “Jane Doe”. It must consist of 1-128 unicode characters. It does not need to be unique.

  3. The externalId attribute:

    1. If you are using Wire’s SAML SSO feature then set externalId attribute to the same identifier as NameID in your SAML configuration.

      If this identifier is an email address, then you can optionally enable email validatation during provisioning by activating the validateSAMLemails feature flag.

    2. If you are using email/password authentication then set the externalId attribute to the user’s email address. The user will receive an invitation email during provisioning. Also note that the account will be set to "active": false until the user has accepted the invitation and activated the account.

You can optionally make use of Wire’s urn:wire:scim:schemas:profile:1.0 extension field to store arbitrary user profile data. See docs for details.