Skip to main content

[Upcoming] Auto-provisioning Holistics users with SCIM

Introduction

SCIM automatically syncs users and groups from your identity provider (Okta, Microsoft Entra ID, etc.) to Holistics. Manage access in one place: add or remove users in your IdP, and Holistics stays in sync.

okta-sync-demo-imp.png

Before you begin

Prerequisites
  • SAML SSO configured: Your organization must have SAML Single Sign-On set up before enabling SCIM.
  • Admin access: You must be Admin in both Holistics and your identity provider.
  • Seat availability: Ensure you have enough seats in your Holistics plan. When syncing, existing users (same email) get linked without using extra seats, but new users consume seats. Provisioning fails if it exceeds your seat limit.

How SCIM works

SCIM provisioning in Holistics is one-way only, changes flow from your identity provider to Holistics, not the other way around. Once enabled, all user and group changes should be made in your identity provider.

What gets synced

FeatureSupportedExample
Push new usersYou assign a new user to the Holistics app in your identity provider
Update user profilesYou update a user's name or email in your identity provider
Deactivate usersYou remove a user from the Holistics app in your identity provider
Push groupsYou add a new group in your identity provider and push it to Holistics
Sync group membershipYou add or remove users in a group in your identity provider

Two types of users

Once SCIM is enabled, you'll have two types of users in Holistics:

  • Synced users are automatically created and managed through your identity provider. They cannot be edited directly in Holistics. Any changes (name, email, status) must be made in your IdP. By default, synced users are assigned the Viewer role.

  • Manually-created users are users you create directly in Holistics. You can still add users manually if needed. If a user with the same email is later synced from your identity provider, they become a synced user.

User management page in Holistics showing a table of users with a 'Source' column indicating whether they are 'Synced' or 'Manual'.

You can identify the user type by checking the Source column in the User Management page.

Two types of groups

Similarly, groups can be synced or manual:

  • Synced groups come from your identity provider and cannot be edited in Holistics.
  • Manual groups are created directly in Holistics and remain fully editable.

Set up SCIM in Holistics

Follow these steps to enable SCIM provisioning for your organization.

Step 1: Enable SCIM provisioning

  1. Navigate to Settings > Single sign-on.
  2. Toggle Enable SCIM Provisioning to on.
  3. Once enabled, you'll see:
    • SCIM Base URL: The endpoint for your identity provider
    • Certificate: Required by your identity provider to authenticate SCIM requests
    • Group to role mapping: Configure role assignments for synced users
SCIM provisioning settings in Holistics, showing the toggle to enable it, the SCIM Base URL, and the Certificate.

Step 2: Configure group-to-role mapping

Important

Configure group-to-role mapping before syncing users from your identity provider. Otherwise, all synced users (including current admins) will default to the Viewer role, which could lock you out.

By default, all synced users get the Viewer role (least permissions). To assign different roles based on group membership, map your IdP groups to Holistics roles in the Group to role mapping section.

Group-to-role mapping configuration in Holistics, showing IdP groups being mapped to Holistics roles like Admin, Analyst, and Explorer.

For example:

  • HOLISTICS_ADMIN → Admin role
  • HOLISTICS_ANALYST → Analyst role
  • HOLISTICS_EXPLORER → Explorer role
  • BUSINESS_USER → Viewer role

Available roles (from least to most privileged): Viewer < Explorer < Analyst < Admin

Multiple Group Membership

If a user belongs to multiple mapped groups, they receive the least privileged role. For example, a user in both HOLISTICS_ADMIN and HOLISTICS_ANALYST groups will be assigned the Analyst role.

Step 3: Configure your identity provider

Now configure SCIM provisioning in your identity provider using the SCIM Base URL and Certificate from Holistics.

For Okta:

  1. In your Okta admin console, go to your Holistics application.
  2. Navigate to the Provisioning tab and click Configure API Integration.
  3. Enter the SCIM Base URL and Certificate from Holistics.
  4. Enable the provisioning features you need (Create Users, Update User Attributes, Deactivate Users).
  5. Configure attribute mappings and push groups as needed.

For Microsoft Entra ID (Azure AD):

  1. In the Azure portal, go to your Holistics enterprise application.
  2. Navigate to Provisioning and set the mode to Automatic.
  3. Enter the SCIM Base URL as the Tenant URL and the Certificate as the Secret Token.
  4. Test the connection and save.
  5. Configure attribute mappings and enable provisioning.

For other identity providers, refer to your provider's SCIM documentation using the SCIM Base URL and Certificate from Holistics.

Transitioning existing organizations

If you already have users and groups in Holistics, here's what happens when you enable SCIM:

Existing users

  • They won't be deleted.
  • If a user from your IdP has the same email as an existing Holistics user, they become linked.
  • Linked users can no longer be edited directly in Holistics.
  • Their role will be determined by group-to-role mapping rules. If no mapping applies, they default to Viewer.
Role Changes

Existing users with Admin or Analyst roles will be downgraded to Viewer if you don't set up group-to-role mapping first. Make sure to configure your mappings before enabling SCIM.

Existing groups

  • They won't be deleted.
  • If a group from your IdP has the same name as an existing Holistics group, they become linked.
  • Linked groups become read-only in Holistics.

Disable SCIM provisioning

If you need to stop using SCIM:

  1. Go to Admin Settings > SSO & SCIM Integration.
  2. Toggle Enable SCIM integration to off.
  3. Previously synced users and groups will remain in Holistics but become editable again.
info

Disabling SCIM doesn't delete any users or groups. It only stops the automatic sync from your identity provider.

Audit logs

You can check the SCIM audit logs page to view provisioning history and troubleshoot any sync issues.

FAQs

Can I still add users directly in Holistics after enabling SCIM?

Yes, you can still create manual users. However, we recommend managing all users through your identity provider for consistency.

What happens if I delete a user in my identity provider?

When you remove or deactivate a user in your identity provider, they will be deactivated (not deleted) in Holistics. They won't be able to log in, but their data and activity history are preserved.

Can I use SCIM without SAML SSO?

No, SAML SSO must be configured before enabling SCIM. This ensures users authenticate through your identity provider rather than with separate Holistics passwords.

How often does my identity provider sync with Holistics?

Sync frequency depends on your identity provider's configuration. Most providers (like Okta and Entra ID) push changes to Holistics in near real-time, but some may batch updates on a schedule. Check your identity provider's documentation for details.

What happens when I hit my seat limit and the IdP pushes a new user?

The provisioning request will fail, and the new user will not be created in Holistics. Your identity provider will receive an error response. You'll need to either increase your seat limit or remove existing users before provisioning new ones.

Limitations

  • User attributes cannot be synced via SCIM. User attributes must be manually created and managed in Holistics for all users, whether synced or manually created.
  • Roles cannot be provisioned directly via SCIM, only through group-to-role mapping.

Let us know what you think about this document :)