Insomnia logo
  • Documentation
  • Get Started for Free
    • Introduction to Insomnia
    • Install Insomnia
    • Send Your First Request
    • Import and Export Data
    • Environment Variables
    • Global Environments
    • Insomnia Accounts
    • Forgotten Passphrase
    • Managing E2EE (End-to-End Encryption)
    • Organizations
    • Enable Enterprise membership
    • Configuring EE SSO
    • Integrating Insomnia Enterprise with Okta SAML 2.0
    • Integrating Insomnia Enterprise with Okta OpenID Connect
    • Integrating Insomnia Enterprise with Microsoft Azure/Entra ID SAML 2.0
    • Insomnia Whitelisting Guide for Enterprise Users
    • Transfer enterprise organizations and license
    • Configuring SCIM
    • Multiple Owners
    • Manage Domains
    • Invite Controls
    • Storage Controls
    • Session Report
    • Insomnia Subscriptions
    • Insomnia Subscription Management
    • Scratch Pad Tutorial
    • Requests
    • Responses
    • Request Collections
    • Request Timeouts
    • Chaining Requests
    • Post CSV Data
    • SOAP Requests
    • gRPC
    • WebSocket Support
    • Get Started with Documents
    • Design Documents
    • Linting
    • GraphQL for OpenAPI
    • Migrate from Designer
    • Unit Testing
    • Stress Testing
    • Insomnia Storage Options Guide
    • Sync with Insomnia Cloud
    • Sync with Git
    • Key Security Features
    • Security Standards
    • Signup and Authentication
    • Analytics Collected
    • End to End Data Encryption
    • Software Bill of Materials
    • Verifying Build Provenance for Signed Insomnia Binaries
    • Authentication
    • Client Certificates
    • Collection Runner
    • Generate Code Snippet
    • Cookie Management
    • Encoding
    • GraphQL Queries
    • Run in Insomnia Button
    • Key Maps
    • Proxy
    • Folder-level settings
    • Introduction to Plugins
    • Context Object Reference
    • Template Tags
    • Hooks and Actions
    • Custom Themes
    • AI Runner
    • FAQ
    • Application Data
    • SSL Validation
    • Password Recovery
    • Introduction to Inso CLI
    • Install Inso CLI
    • CLI Command Reference
      • inso run test
      • inso run collection
      • inso lint spec
      • inso export spec
      • inso script
      • Using Custom Linting with Inso CLI
    • Configuration
    • Inso CLI on Docker
    • Software Bill of Materials
    • Verifying Signatures for Signed Inso CLI Images
    • Verifying Inso CLI Build Provenance
      • Verifying Build Provenance for Signed Inso CLI Images
      • Verifying Build Provenance for Signed Inso CLI Binaries
    • Continuous Integration
    • Insomnia Pre-request Script Overview
    • Insomnia After-Response Script Overview
    • Secret Environment Variables
    • External Vault Integration (Enterprise feature)
    • Insomnia API Mocking Overview
    • Enterprise Login Report

Configuring SCIM

Configure Enterprise SCIM Provisioning

What is SCIM Provisioning?

SCIM stands for System for Cross-domain Identity Management. It allows Insomnia to provision enterprise member accounts and Insomnia Teams by your identity provider (like Okta Workspace, Azure Entra or Ping Federate) configured for Single-Sign-On. With such configuration, your identity provider (IDP) becomes the source of truth for your license management. You can assign a new user to a license or de-provision it by a matter of clicks in your IDP.

In order to activate Insomnia’s SCIM endpoints for your IDP, there are several steps you need to follow; 1. Configure Single-Sign-On, 2. Generate Base Connector URL and Token, 3. Configure your IDP for provisioning.

1. Configure Single-Sign-On (SSO)

If you previously set up the SSO already on your IDP side, you might skip this step. However, if your IDP is Azure Entra ID and you used the Entra Gallery to set up the IDP, you need to redo the SSO configure step manually. Please refer to the appropriate link below to get more information. enable scim enable scim modal

2. Generate Base Connector URL and Token

After configuring the SSO in the Enterprise Controls page, navigate to SCIM menu and click. Once you are in the SCIM page, confirm which identity provider your SSO is configured with if you haven’t confirmed yet. Once you do that, you will be able to toggle the switch to enable it.

When toggling the switch on, you will be prompted with a modal where you can follow the instruction. It is very important to note that the token generated is only shown once. Grab the token value as well as the connector URL and move to your IDP SCIM Provisioning page.

3. Configure your IDP SAML Application for SCIM

Okta

3-1 Navigate to your SAML application App Settings tab and enable Provisioning with SCIM

okta general tab

This will toggle the “Provisioning” tab into the view.

3-2a Navigate to Provisioning tab and set the configuration as the following

In the Integration settings,

okta provisioning tab

a. Paste the SCIM connector base URL from Insomnia SCIM panel into the SCIM connector base URL input b. Paste the unique identifier from Insomnia SCIM panel into the Unique identifier field for users input c. Check “Push New Users”, “Push Profile Updates”, “Push Groups” in the “Supported provisioning actions” section. d. Select Authentication Mode as “HTTP Header” e. Paste the Bearer token from Insomnia SCIM panel into the Authorization input f. Click Test Connector Configuration button to test g. Click Save

In To App settings,

okta provisioning to app

Check “Create Users” and “Deactivate Users” to be enabled.

Azure

3-1 Navigate to your Enterprise application

azure enterprise app

3-2 Navigate to Provisioning tab and configure your SCIM provisioning

azure enterprise app provisioning Place the base connector url value to Tenant URL input and put the token into the Secret Token. After placing them, click the “Test Connection” button to test the connection.

3-3 Assign users and groups

Go to the Users and groups tab and click the “Add user/group” button to assign users and groups. Make sure that any users who are part of a group also are assigned to this application. azure enterprise app assgining users and groups azure enterprise app assgining

3-4 Provision the assigned users and group

Navigate to the Provision On-demand page. After selecting the assigned users and groups, click on “Provision” button. azure provision on demand

Edit this page
Report an issue
    COMPANY
  • Insomnia
  • Blog
  • Changelog
  • Pricing
  • Careers
    PRODUCTS
  • Insomnia
  • Inso (CLI)
    RESOURCES
  • Sign In
  • Documentation
  • Support
    LEGAL
  • Privacy Policy
  • Terms & Conditions
© Kong Inc. 2021