Using 3rd Party IAM to Provisioning Enterprise Users via SCIM #178934
-
Select Topic AreaGeneral BodyHello all I'm testing provisioning Enterprise Users using SCIM through a platform other than the officially support IDPs Azure (Entra), Okta or Ping Fed, using a 30-day EMU trial for "managed users". In reading through one of the Git docs related to provisioning via SCIM, it indicates this can be done. The referenced doc is at: https://docs.github.com/en/enterprise-cloud@latest/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users In doing some baseline testing through Postman, I get an error when attempting to post to the /Users endpoint. The message states the operation is only supported on those platforms. (message below). Before digging further into this, I wanted to check if this is indeed feasible or we are constrained to just those providers. I am using a generated SCIM token with all scopes enabled. I can successfully run a list of users (GET) but the not the POST for user create. If it's a request configuration issue, I wouldn't expect this type of message (though wouldn't rule it out). I'm reviewing additional detail and testing. Appreciate any insights from the community. Error seen in Postman { |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 3 replies
-
|
Hi @donc-radiant-dev 👋🏼 , In your testing and reviewing, have you:
|
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
|
Response from GitHub support clarified the issue. Using IDP with OIDC does not support open SCIM. Need to change to SAML for authentication. This worked for me. Support indicated others have asked about this capability and potential for future inclusion but nothing planned at this time. |
Beta Was this translation helpful? Give feedback.




Response from GitHub support clarified the issue. Using IDP with OIDC does not support open SCIM. Need to change to SAML for authentication. This worked for me.
Support indicated others have asked about this capability and potential for future inclusion but nothing planned at this time.