How to set up user provisioning with SCIM¶
To set up the connection of your SCIM client (e.g. Azure Active Directory) you need to provide
The URL under which Wire’s SCIM API is hosted:
https://prod-nginz-https.wire.com/scim. If you are hosting your own instance of Wire then the URL is
<hostname>is where you are serving Wire’s public endpoints.
A OAuth 2.0 Bearer Token which authorizes the use of the SCIM API. Use the wire_scim_token.py script to generate a token. To run the script you need access to an user account with “admin” privileges that can login via email and password.
You need to configure your SCIM client to use the following mandatory SCIM attributes:
userNameattribute to the desired user handle (the handle is shown with an @ prefix in apps). It must be unique accross the entire Wire Cloud (or unique on your own instance), and consist of the characters
a-z0-9_.-(no capital letters).
displayNameattribute to the user’s desired display name, e.g. “Jane Doe”. It must consist of 1-128 unicode characters. It does not need to be unique.
If you are using Wire’s SAML SSO feature then set
externalIdattribute to the same identifier as
NameIDin your SAML configuration.
If this identifier is an email address, then you can optionally enable email validatation during provisioning by activating the
If you are using email/password authentication then set the
externalIdattribute to the user’s email address. The user will receive an invitation email during provisioning. Also note that the account will be set to
"active": falseuntil the user has accepted the invitation and activated the account.
You can optionally make use of Wire’s
urn:wire:scim:schemas:profile:1.0 extension field to store arbitrary user profile data. See docs for details.