Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 4 additions & 2 deletions docs.json
Original file line number Diff line number Diff line change
Expand Up @@ -430,7 +430,8 @@
"pages": [
"en/Workspaces",
"en/Permissions",
"en/Security"
"en/Security",
"en/SCIM"
]
},
{
Expand Down Expand Up @@ -1347,7 +1348,8 @@
"pages": [
"ja/Workspaces",
"ja/Permissions",
"ja/Security"
"ja/Security",
"ja/SCIM"
]
},
{
Expand Down
35 changes: 35 additions & 0 deletions en/SCIM.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
---
title: "SSO and SCIM"
description: "Connect AI supports the SSO and SCIM protocols. SSO enables users to sign in through your chosen SSO instead of using Connect AI login credentials. SCIM standardizes the process of granting or removing access from Connect AI."
---

## SSO

Connect AI supports the following SSO providers:

- SAML
- OpenID Connect
- Google Workspace
- Microsoft Entra ID (formerly Azure AD)
- Active Directory Federation Services (ADFS)
- Active Directory/LDAP
- Ping Federate
- Okta Workforce Identity Cloud

To enable SSO for your account, contact [CData Support](https://www.cdata.com/support/submit.aspx).

## SCIM

The System for Cross-domain Identity Management (SCIM) is a standard for managing user provision, update, and deletion in cloud-based applications. It allows you to use your company's identity provider, such as Okta or Entra ID, to provision, update, and delete users securely in Connect AI. To enable SCIM, contact [CData Support](https://www.cdata.com/support/submit.aspx).

### User Provision, Update, and Deletion

When you provision SCIM, CData support supplies a unique base URL following this format: `https://{your-domain.com}/scim/v2`. The URL endpoint contains the necessary user metadata. All SCIM endpoints require an authorization header with a bearer token.

To provision a new user, `POST` to your unique SCIM endpoint. The system provisions the user in both Auth0 and Connect AI. There is no need for the user to verify via email. The new user has a default role of Admin.

To update a SCIM user's name and email, use `PATCH` with the SCIM endpoint. When a SCIM update user request comes in, the system updates the information in both Auth0 and Connect AI.

To delete a user, use `DELETE` and your unique SCIM endpoint. The SCIM delete event triggers an action in Auth0 that calls the delete endpoint.

The Connect AI [Audit Log](/en/Logs#audit-log) displays SCIM user provision, update, and deletion.