SCIM (System for Cross-domain Identity Management) Integration
Set up SCIM in Harvey to automate user provisioning, deprovisioning, and group-based access management through your organization’s identity provider.
Last updated: Mar 31, 2026
Overview
SCIM integration connects Harvey to your organization’s identity provider (IdP) so you can manage users and access from a single source of truth. Instead of updating accounts manually, you can automate provisioning, deprovisioning, and group-driven access changes as your directory changes.
Note: This feature is currently in early access for Microsoft Entra ID and Okta. Please contact your Customer Success Manager for early access.
With SCIM in Harvey, you can:
- Automatically provision and deprovision users: Create, update, and deactivate user accounts directly from your Identity Provider. No more manual user management — changes in your IdP are automatically reflected in Harvey
- Sync users and groups from your identity provider: Keep roles, permissions, and group memberships accurate and up to date automatically, ensuring users always have the right level of access
- Map directory groups to Harvey roles and user groups: Automatically assign users to the right roles and groups based on your existing directory structure, making access management more consistent, scalable, and easier to govern across the firm
- Keep access aligned with your organization’s current directory: Reflect user and group changes in Harvey as your directory changes, helping your firm maintain accurate permissions, strengthen security, and reduce manual upkeep
Prerequisites:
- SSO (SAML) is configured and enabled for your workspace
- SCIM is enabled for your workspace
- You have admin access to configure identity settings
How to Use
Step 1: Enable SCIM in Harvey

- Go to Settings → Identity & Access.
- Turn on the SCIM provisioning toggle.
- Click Setup SCIM.
- Select a default role for users who are not included in any mapped group.
- Copy the SCIM URL and SCIM token. You will use these in your identity provider.
Step 2: Connect with Identity Provider

Microsoft Entra

- Sign in to the Microsoft Entra admin center.
- Go to Enterprise apps and select New application.
- Select Create your own application.
- Enter an application name, such as Harvey.ai, then choose Integrate any other application you don’t find in the gallery (Non-gallery).
- Open the new application and go to Provisioning.
- Select Connect Your Application.
- Choose Bearer authentication.
- Paste the Harvey SCIM URL into Tenant URL and the Harvey SCIM token into Secret token.
- Keep the
aadOptscim062020query parameter in the Tenant URL. Do not remove it. - Click Test Connection, then save the configuration.
- In Mappings, review the user and group attribute mappings.
- Confirm that
externalIdis mapped toobjectId. - Confirm that
emails[type eq "work"].valueis mapped to a valid email attribute for your directory. - Make sure provisioning is enabled for both users and groups, with Create, Update, and Delete actions turned on.
- Go to Users and groups and assign the users and groups you want to sync.
- In Provisioning → Settings, set Scope to Sync only assigned users and groups.
- Set Provisioning Status to On.
Okta

- Sign in to the Okta admin console.
- Go to Applications → Applications.
- Click Browse App Catalog.
- Search for SCIM 2.0 Test App (OAuth Bearer Token) and add it.
- Name the application, such as Harvey.ai, and complete the basic setup.
- Open the application and go to the Provisioning tab.
- Click Configure API Integration.
- Turn on Enable API Integration.
- Paste the Harvey SCIM URL into SCIM 2.0 Base Url.
- Paste the Harvey SCIM token into OAuth Bearer Token.
- Click Test API Credentials, then save.
- In Provisioning → To App, enable:
- Create Users
- Update User Attributes
- Deactivate Users
- Go to Assignments and assign the people you want to provision.
- Go to Push Groups and push the groups you want Harvey to sync.
- Use separate groups for app assignments and pushed groups to avoid group membership sync issues.
Step 3: Map Groups and Roles in Harvey

- Return to Settings → Identity & Access in Harvey.
- Map synced directory groups to Harvey roles.
- Map synced directory groups to Harvey user groups, if needed.
- Review your mappings carefully before broad rollout.
Note: Users without an explicit group-to-role mapping receive the default role you selected during setup.
Step 4: Test and Monitor the Sync
- Start provisioning from your identity provider.
- Confirm that test users and groups appear correctly in Harvey.
- Verify that expected roles and user groups are assigned.
- Review Harvey’s audit logs to confirm provisioning events and configuration changes.
Note: A full sync may take several minutes depending on the size of your directory.
Known Limitations
- SCIM must be enabled for each workspace before configuration is available
- SCIM requires SSO (SAML) to be configured first
- Only Microsoft Entra ID and Okta are supported in this release
- Resetting SCIM removes SCIM configuration and sync state, but does not remove users previously provisioned through SCIM
- Disabling the SCIM toggle makes SCIM endpoints unavailable until SCIM is re-enabled
Tips for Success
- Start with a small pilot group before enabling SCIM for your full directory
- Define your group structure in your identity provider before configuring role mappings in Harvey
- Choose a default role that gives users appropriate baseline access
- In Entra, validate email and
externalIdmappings before turning provisioning on - In Okta, use separate groups for assignments and pushed groups to reduce sync issues
- Review audit logs after setup to confirm users, groups, and roles are syncing as expected