Skip to main content

How to Activate SCIM in AutoRFP

Automatically sync users and groups from your identity provider to AutoRFP

Saul Bard avatar
Written by Saul Bard
Updated this week

Article Summary

SCIM (System for Cross-domain Identity Management) automatically syncs users and groups from your identity provider to AutoRFP. When you add or remove users in your identity provider, those changes are automatically reflected in AutoRFP without manual updates.


Estimated Time

10-15 minutes


Prerequisites

  • Admin access to AutoRFP

  • Admin access to your identity provider (Okta or Microsoft Entra ID)

  • Ability to generate and securely store credentials


Supported Identify Providers

AutoRFP currently supports SCIM integration with:

  • Okta

  • Microsoft Entra ID (formerly Azure AD)


Step-by-Step Instructions

Part 1: Enable SCIM Provisioning in AutoRFP

Step 1: Navigate to Integrations

  1. Click the Organization tab in the left navigation menu

  2. Click the Integrations tab in the top menu

Step 2: Turn On SCIM Provisioning

  1. Locate the Provisioning section

  2. Toggle SCIM provisioning ON

  3. Confirm it's enabled when you see the Manage Credentials button appear on the identity provider cards


Part 2: Generate OAuth Credentials

You'll need OAuth credentials to securely connect your identity provider to AutoRFP.

Step 1: Create New OAuth Client

  1. Click Manage Credentials

  2. Click New Client

  3. Enter a creative client name (e.g., "Okta SCIM Production")

  4. Select whether this is for a Production or Sandbox environment

  5. Choose a default user to impersonate:

    • Select an existing Admin user, OR

    • Create a new integration-specific Admin user (recommended for tracking)

  6. Click Create Client

Step 2: Save Your Client ID

  1. Copy the Client ID that appears

  2. Store it securely (you'll need this for your identity provider configuration)

‼️ Important: Keep this credential secure and don't share it publicly.

Step 3: Generate Secret Key

  1. Enter a descriptive name for your secret key (e.g., "Production Secret Key")

  2. Click Create Secret Key

  3. Immediately copy and securely store your Secret Key

‼️ Important: The secret key will only be displayed once. If you navigate away, you'll need to generate a new one.


Part 3: Configure Your Identity Provider

Now that you have your Client ID and Secret Key, complete the setup in your identity provider:

Okta Users:
Follow our Okta SCIM Configuration Guide for detailed setup instructions

Microsoft Entra ID Users:
Follow our Entra ID SCIM Configuration Guide for detailed setup instructions


🛠️ Troubleshooting

Lost or Forgot Secret Key

If you lose your Client Secret:

  1. Navigate to Organisation → Integrations

  2. Click Manage Credentials

  3. Either:

    • Create a new secret key within the existing client, OR

    • Create an entirely new OAuth client

  4. Copy and securely store the new credentials

  5. Important: Update the credentials in your identity provider configuration

Your previous secret key will be invalidated once you generate a new one.

SCIM Sync Not Working

If users aren't syncing after setup:

  1. Verify SCIM provisioning is toggled ON in AutoRFP

  2. Confirm credentials in your identity provider match those generated in AutoRFP

  3. Check that the impersonation user has Admin permissions

  4. Review sync logs in your identity provider for specific error messages

  5. Contact support with error details if issues persist


💡 Tips & Best Practices

  • Use descriptive names for OAuth clients and secret keys to identify them later

  • Document where you've stored your credentials securely


✋🏼 Common Mistakes to Avoid

  • Losing your Secret Key before completing identity provider setup (it's only shown once)

  • Not verifying Admin permissions on the impersonation user


Need Help?

💬 Live Chat: Available in-app
📧 Email: [email protected] or contact your Success Manager directly for urgent support
📚 Learning Centre: learn.autorfp.ai/en

Did this answer your question?