icon-unified.svg
Experience Center

About SCIM

System for Cross-domain Identity Management (SCIM) is a standard protocol for automating the exchange of identity information. Enabling SCIM allows you to quickly remove users from the Private Applications service when a user is disabled or deleted in your user directory and to enforce policies based on SCIM attributes and SCIM groups. To learn more, see Deleting Users in SCIM.

SCIM provides the following benefits and enables you to:

  • Automatically modify a user's access when their attributes, group membership, or status changes.
  • Enforce policies based on SCIM user attributes and SCIM groups.
  • Improve the admin experience by populating SCIM user attributes and SCIM groups when configuring policies.

Setting up SCIM requires configuration in the Admin Portal and requires using an IdP partnered with Zscaler for SCIM:

The Private Applications service works with any IdP that supports the SCIM standard (e.g., SailPoint).

Users might encounter a connection error in Zscaler Client Connector when enabling SCIM sync with Okta. Okta does not sync users to the Private Applications service in the Okta IdP before you enable SCIM. As a result, users do not initially appear in the SCIM user database when SCIM is enabled in the Private Applications service. Zscaler recommends the following to resolve the connection error in Zscaler Client Connector:

  • Enable PROVISION_OUT_OF_SYNC_USERS in Okta.
  • Unassign and reassign all users and groups from the Private Applications service in Okta, and then wait for the sync to occur.

Most of the time, the IdP you set up for SAML authentication will be the same one you use for SCIM identity management.

Zscaler only supports SCIM version 2.0.

You can also use custom SCIM clients to make REST API calls to Zscaler. To learn more, see About SCIM APIs and SCIM API Examples.

About the SCIM Attributes Page

The SCIM Attributes page is a read-only table, and the Private Applications service does not support custom attributes. You must enable SCIM for any information to appear on this page. To learn more, see Enabling SCIM for Identity Management.

On the SCIM Attributes page (Administration > Identity > Private Access > SCIM Attributes), you can do the following:

  1. Select an identity provider enabled for SCIM to generate a list of attributes in the table.
  2. Enter a SCIM attribute associated with the IdP, and click Apply to filter the table.
  3. View a list of SCIM attributes. For each attribute, you can see:
    • SCIM Attribute Name: The name of the SCIM attribute as it is specified in the IdP.
    • SCIM Attribute: The SCIM attribute as it is specified in the IdP.
    • Required Attribute: The attributes that must sync between an IdP and Zscaler. Currently, only username is required.

      The SCIM username attribute must match nameID in the SAML attribute.

    • Unique Attribute: The attribute with a unique value used to identify the user or group. For example, two users cannot share the same username. Currently, username is the only unique attribute.
  4. Copy the SCIM Attribute to your clipboard.
Viewing the SCIM Attributes page

Supported SCIM Attributes

The following table includes the supported SCIM attributes and their values:

SCIM Attribute NameSCIM AttributeDescription
ActiveactiveWhen "active=false", Zscaler deletes this user. When "active=true", Zscaler enables this user.
Cost CentercostCenterThe cost center that the user belongs to
DepartmentdepartmentThe department that the user belongs to
Display NamedisplayNameThe display name of the user
DivisiondivisionThe division that the user belongs to
Emailemails.valueThe email address of the user
First Namenames.givenNameThe first name of the user
Formatted Namename.formattedThe formatted name of the user
Last Namename.familyNameThe last name of the user
id<unique_id>Unique ID generated by Zscaler (e.g., 1a1234567-1b23-1200-1234-123c)
OrganizationorganizationThe organization of the user
TitletitleThe title of the user
UsernameuserNameThe user ID used for authentication. The expected format is user@domain.com (e.g., user1@safemarch.com).
UserTypeuserTypeIndicates the type of user
Related Articles
About SCIMAbout SCIM UsersAbout SCIM GroupsAbout SCIM Sync LogsAbout SCIM APIsSCIM API ExamplesEnabling SCIM for Identity ManagementDeleting Users in SCIM