Article Summary
SCIM (System for Cross-domain Identity Management) automatically syncs users and groups from your identity provider to AutoRFP. When you add or remove users in your identity provider, those changes are automatically reflected in AutoRFP without manual updates.
Estimated Time
10-15 minutes
Prerequisites
Admin access to AutoRFP
Admin access to your identity provider (Okta or Microsoft Entra ID)
Ability to generate and securely store credentials
Supported Identify Providers
AutoRFP currently supports SCIM integration with:
Okta
Microsoft Entra ID (formerly Azure AD)
Step-by-Step Instructions
Part 1: Enable SCIM Provisioning in AutoRFP
Step 1: Navigate to Integrations
Click the Organization tab in the left navigation menu
Click the Integrations tab in the top menu
Step 2: Turn On SCIM Provisioning
Locate the Provisioning section
Toggle SCIM provisioning ON
Confirm it's enabled when you see the Manage Credentials button appear on the identity provider cards
Part 2: Generate OAuth Credentials
You'll need OAuth credentials to securely connect your identity provider to AutoRFP.
Step 1: Create New OAuth Client
Click Manage Credentials
Click New Client
Enter a creative client name (e.g., "Okta SCIM Production")
Select whether this is for a Production or Sandbox environment
Choose a default user to impersonate:
Select an existing Admin user, OR
Create a new integration-specific Admin user (recommended for tracking)
Click Create Client
Step 2: Save Your Client ID
Copy the Client ID that appears
Store it securely (you'll need this for your identity provider configuration)
‼️ Important: Keep this credential secure and don't share it publicly.
Step 3: Generate Secret Key
Enter a descriptive name for your secret key (e.g., "Production Secret Key")
Click Create Secret Key
Immediately copy and securely store your Secret Key
‼️ Important: The secret key will only be displayed once. If you navigate away, you'll need to generate a new one.
Part 3: Configure Your Identity Provider
Now that you have your Client ID and Secret Key, complete the setup in your identity provider:
Okta Users:
Follow our Okta SCIM Configuration Guide for detailed setup instructions
Microsoft Entra ID Users:
Follow our Entra ID SCIM Configuration Guide for detailed setup instructions
🛠️ Troubleshooting
Lost or Forgot Secret Key
If you lose your Client Secret:
Navigate to Organisation → Integrations
Click Manage Credentials
Either:
Create a new secret key within the existing client, OR
Create an entirely new OAuth client
Copy and securely store the new credentials
Important: Update the credentials in your identity provider configuration
Your previous secret key will be invalidated once you generate a new one.
SCIM Sync Not Working
If users aren't syncing after setup:
Verify SCIM provisioning is toggled ON in AutoRFP
Confirm credentials in your identity provider match those generated in AutoRFP
Check that the impersonation user has Admin permissions
Review sync logs in your identity provider for specific error messages
Contact support with error details if issues persist
💡 Tips & Best Practices
Use descriptive names for OAuth clients and secret keys to identify them later
Document where you've stored your credentials securely
✋🏼 Common Mistakes to Avoid
Losing your Secret Key before completing identity provider setup (it's only shown once)
Not verifying Admin permissions on the impersonation user
Need Help?
💬 Live Chat: Available in-app
📧 Email: [email protected] or contact your Success Manager directly for urgent support
📚 Learning Centre: learn.autorfp.ai/en



