Terraform
- Terraform Enterprise
- 1.2.x
- 1.1.x
- 1.0.x
- v202507-1
- v202506-1
- v202505-1
- v202504-1
- v202503-1
- v202502-2
- v202502-1
- v202501-1
- v202411-2
- v202411-1
- v202410-1
- v202409-3
- v202409-2
- v202409-1
- v202408-1
- No versions of this document exist before v202408-1. Click below to redirect to the version homepage.
- v202407-1
- v202406-1
- v202405-1
- v202404-2
- v202404-1
- v202402-2
- v202402-1
- v202401-2
- v202401-1
- v202312-1
- v202311-1
- v202310-1
- v202309-1
- v202308-1
- v202307-1
- v202306-1
- v202305-2
- v202305-1
- v202304-1
- v202303-1
- v202302-1
- v202301-2
- v202301-1
- v202212-2
- v202212-1
- v202211-1
- v202210-1
- v202209-2
- v202209-1
- v202208-3
- v202208-2
- v202208-1
- v202207-2
- v202207-1
- v202206-1
Configure SCIM provisioning
This topic provides the setup workflow for configuring SCIM provisioning in Terraform Enterprise and then configuring your identity provider.
Overview
Complete the following steps to configure SCIM provisioning:
- Enable SAML SSO. SCIM handles provisioning, but SAML handles sign-in. Refer to Configure SAML.
- Enable SCIM provisioning in Terraform Enterprise.
- Create a SCIM token for your identity provider. Refer to Tokens.
- Configure your identity provider with the Terraform Enterprise SCIM base URL, token, and attribute mappings.
- Map IdP groups to Terraform Enterprise teams. Refer to Link SCIM groups to teams.
- Test and verify the setup before broader rollout.
SCIM states
| State | What it means |
|---|---|
| Disabled | Default state. Terraform Enterprise does not process public SCIM provisioning requests to /scim/v2/Users or /scim/v2/Groups. You cannot pause SCIM until it is enabled. |
| Enabled | Terraform Enterprise processes public SCIM provisioning requests to /scim/v2/Users and /scim/v2/Groups. Your identity provider can create and update users and groups. Team membership sync happens only for teams that are linked to a SCIM group. |
| Paused | SCIM stays enabled, but Terraform Enterprise stops processing public SCIM provisioning requests to /scim/v2/Users and /scim/v2/Groups. Existing SCIM users, groups, team links, and tokens stay in place. Users can still sign in with SAML. |
Requirements
Before you enable SCIM:
- You must be a site administrator. For more information, refer to Site Administration Permissions.
- SAML SSO must already be enabled. SCIM handles provisioning. SAML handles sign-in. For setup steps, refer to Configure SAML.
- Configure SCIM on the same identity provider that you use for SAML SSO.
- Terraform Enterprise supports SCIM with Microsoft Entra ID, Okta, and supported generic SAML provider configurations. We provide setup guides for Okta and Microsoft Entra ID.
- Keep at least one non-SSO admin account for recovery.
Configure Terraform Enterprise for SCIM
- Open your user icon menu and click Site Admin, or go to
https://<TFE_HOSTNAME>/app/admin/scim. - Click Enable SCIM provisioning.
- Copy the SCIM base URL. Use
https://<TFE_HOSTNAME>/scim/v2when you configure your identity provider.
After you enable SCIM, generate a token and configure your identity provider.
For API-based configuration, refer to the Admin SCIM Settings API.
Create a SCIM token
Your identity provider uses a SCIM token to authenticate to Terraform Enterprise.
- In Site Admin > SCIM, click Create Token.
- Enter a description.
- Choose an expiration.
- Copy the token and store it securely.
Terraform Enterprise shows the token only once.
You can keep more than one active SCIM token at the same time. This lets you rotate tokens without downtime. For detailed token management steps, refer to Tokens.
Configure your identity provider
Use one of the following provider-specific setup guides:
You need the following information:
- the SCIM base URL:
https://<TFE_HOSTNAME>/scim/v2 - a SCIM token generated in Terraform Enterprise
- the attribute mappings required by your identity provider
When SCIM is enabled and not paused, Terraform Enterprise can create and update users and groups from incoming SCIM requests. Team membership does not change until you link a SCIM group to a Terraform Enterprise team.
Verify the setup
Test SCIM with a small rollout before using it more broadly.
- Provision a test user from your identity provider and confirm the user appears in Terraform Enterprise.
- Provision a test group and confirm the SCIM group appears in Terraform Enterprise.
- Link the SCIM group to a test team. Refer to Link SCIM groups to teams.
- Confirm that team membership updates as expected.
- Deactivate or unassign the test user in your identity provider and verify that Terraform Enterprise suspends the user.
Use this test pass to confirm token setup, attribute mappings, and linked-team behavior before wider rollout.
Next steps
After initial setup, use the following topics to manage and troubleshoot SCIM provisioning:
- Maintain the site-level SCIM configuration, including pause and resume behavior, site admin group mapping, token rotation, and disabling SCIM. Refer to Manage SCIM.
- Manage group-to-team links and team-level synchronization behavior. Refer to Link SCIM groups to teams.
- Troubleshoot provisioning, synchronization, and token issues. Refer to Troubleshoot SCIM provisioning.
Refer to Integration settings for the admin interface reference for the Enable SCIM provisioning setting.
API reference
For endpoint-specific behavior, request and response details, limits, and rate limits, refer to: