What does enabling SCIM do?
Without SCIM
By default, without SCIM, incident.io automatically creates users when they join incident Slack channels, or when they sign in to the web dashboard using Slack or SAML. When a user is deactivated in Slack, they’ll be automatically deactivated in incident.io. Without SCIM, you manually grant users additional base roles and custom roles within incident.io. When a new user joins, an owner/admin (or other user with a custom role that can manage permissions) can manually assign that user some additional permissions by going to app.incident.io/settings/users . (You can read more details on permissions here )With SCIM
When SCIM is installed, users are automatically created in incident.io when they are assigned in the application in your Identity Provider. If a user is unassigned the application in your Identity Provider, they’ll be deactivated in incident.io. Additionally, user permissions are automatically managed by your Identity Provider, and are no longer editable in incident.io. This means you don’t have to manually assign roles to new users, and don’t have to manually downgrade users in incident.io if their access levels change in your Identity Provider. (You can read more details on permissions here )Installing SCIM
To install SCIM, you’ll need to be an owner in incident.io (or have a custom role that can manage security settings), and have admin permissions in your Identity Provider.- Go to your user settings, and open the SCIM tab and click the
Installbutton
/screenshot-1.png?fit=max&auto=format&n=-BxE6r49oqe0IfEH&q=85&s=b41f9a2fb929005ee0ace4195105632b)
- Choose your Identity Provider from the list and follow the steps to set up your connection.
/screenshot-2.png?fit=max&auto=format&n=-BxE6r49oqe0IfEH&q=85&s=f9d938c06aecaad89f7318d9bb9abb62)
- Define the relationships between groups in your Identity Provider and permissions in incident.io. You only need to do this for groups that you’d like to give elevated permissions to, by default, all users are given the ‘Standard’ role. To illustrate this further, here are some examples:
- I want all people in the
Engineersgroup to have access to incident.io but not have advanced permissions for administrative tasks. I don’t need to define any mapping for this case, as this is the default. The default ‘Standard’ role assigns all new users a ‘Viewer’ seat. (Learn more about Viewers and Responder seats here .) - I want myself and other
Incident Managersto be admins in incident.io, so I add an assignment, choose theIncident ManagersOkta group and then assign them theAdminrole. - I want our IT team to be able to manage SCIM and SAML, so I add an assignment, choose the
ITOkta group and then assign them a custom role with theCan manage security settingspermission.
/screenshot-3.png?fit=max&auto=format&n=-BxE6r49oqe0IfEH&q=85&s=427550f4c5dcca35c2ffaa6a11f609fc)
- Confirm your SCIM setup. Once you’ve confirmed this step, we’ll start creating users from SCIM and re-assigning any permissions that no longer line up with what you’ve defined in your SCIM group to role mappings.
/screenshot-4.png?fit=max&auto=format&n=-BxE6r49oqe0IfEH&q=85&s=6013dbcbfd2e5b5c6b753729432c38a9)