SCIM Provisioning
Automatically manage users in meetergo through your identity provider
SCIM (System for Cross-domain Identity Management) allows you to automatically provision and deprovision users in meetergo from your identity provider (IdP). When employees join or leave your organization, their meetergo access is updated automatically.
What SCIM Does
| Action in IdP | Result in meetergo |
|---|---|
| Create user | New meetergo account created |
| Update user | User details synced |
| Deactivate user | meetergo access disabled |
| Delete user | User removed from meetergo |
Benefits
- Automated onboarding: New employees get meetergo access automatically
- Instant offboarding: Departing employees lose access immediately
- Reduced admin work: No manual user management
- Consistent data: User info stays in sync with your directory
- Security compliance: Centralized access control
Supported Identity Providers
meetergo's SCIM API works with any IdP that supports SCIM 2.0:
- Okta
- Azure AD / Entra ID
- OneLogin
- JumpCloud
- Google Workspace (via third-party)
- Other SCIM 2.0 compatible systems
Prerequisites
Before setting up SCIM:
- Enterprise plan: SCIM is an enterprise feature
- Admin access: You need company admin rights in meetergo
- IdP admin access: You need to configure your identity provider
- SSO configured: Usually set up SAML SSO first
SCIM Endpoints
meetergo provides these SCIM endpoints:
| Method | Endpoint | Description |
|---|---|---|
GET | /scim/Users/:id | Get user by ID |
GET | /scim/Users | List users (with pagination) |
POST | /scim/Users | Create new user |
PUT | /scim/Users/:id | Update user |
GET | /scim/Groups | List groups (stub) |
PATCH | /scim/Users | Partial update (stub) |
Authentication
SCIM requests use HTTP Basic Authentication:
- Username: Your meetergo company ID
- Password: Your SCIM secret token (provided by meetergo)
Authorization: Basic base64(companyId:scimSecret)
Setting Up SCIM
Step 1: Request SCIM Access
Contact meetergo support to:
- Enable SCIM for your account
- Receive your SCIM credentials
- Get your SCIM endpoint URL
Step 2: Configure Your IdP
In your identity provider:
- Add meetergo as a SCIM application
- Enter the SCIM endpoint URL
- Configure authentication (Basic Auth)
- Map user attributes
Step 3: Attribute Mapping
Map your IdP attributes to meetergo fields:
| IdP Attribute | meetergo Field |
|---|---|
userName | |
name.givenName | firstname |
name.familyName | lastname |
displayName | fullname |
locale | language preference |
externalId | External identifier (for SAML linking) |
active | Account status |
Step 4: Test Provisioning
Before enabling for all users:
- Provision a test user
- Verify they appear in meetergo
- Test attribute sync
- Test deprovisioning
User Lifecycle
Provisioning (Create)
When a user is assigned in your IdP:
- IdP sends POST request to
/scim/Users - meetergo creates the user account
- User receives welcome email (if configured)
- Default availability and meeting type are created
- User can log in via SSO
Updating
When user details change in IdP:
- IdP sends PUT request to
/scim/Users/:id - meetergo updates user information
- Changes reflect immediately
Deprovisioning
When a user is removed from the app in IdP:
- IdP sends PUT with
active: false - meetergo marks user as SCIM-disabled
- User cannot log in
- Data is preserved but inaccessible
What Gets Provisioned
Automatic Setup
When a user is provisioned:
- User account created
- Linked to your company
- Default availability schedule
- Default meeting type (if configured)
- SSO identity linked (via externalId)
What's Not Provisioned
- Calendar connections (user must connect)
- Custom meeting types (admin creates or user creates)
- Personal preferences
SAML + SCIM Integration
For full SSO experience:
- Set up SAML SSO first
- Configure SCIM provisioning
- Link identities via
externalId
The externalId from SCIM is matched with the SAML NameID to link accounts.
Troubleshooting
User Not Provisioned
Check:
- SCIM credentials are correct
- User is assigned to meetergo app in IdP
- Required attributes are mapped
- meetergo's SCIM endpoint is reachable
User Can't Log In
Verify:
- User was provisioned successfully
- User is not deactivated (
active: true) - SAML SSO is configured correctly
externalIdmatches SAML NameID
Attributes Not Syncing
Ensure:
- Attribute mapping is correct in IdP
- IdP is sending update requests
- No transformation errors in IdP logs
Deprovisioning Not Working
Check:
- IdP is sending deactivation request
active: falseis being sent- meetergo received the request (check audit logs)
Best Practices
Start Small
- Pilot with a small group
- Verify provisioning works
- Test deprovisioning
- Roll out to organization
Audit Regularly
- Review provisioned users periodically
- Check for orphaned accounts
- Verify deprovisioned users can't access
Document Your Setup
Keep records of:
- Attribute mapping configuration
- Custom settings
- Integration contacts
Limitations
Group Provisioning
meetergo's SCIM implementation focuses on users. Group management is handled within meetergo's native interface.
Partial Updates (PATCH)
The PATCH endpoint is a stub. Use PUT for updates.
FAQ
Can I provision users without SSO?
SCIM works best with SSO. Users provisioned via SCIM typically log in via SAML SSO.
What happens to a user's data when deprovisioned?
Data is preserved but the user cannot access it. For full deletion, contact support.
Can I re-provision a deprovisioned user?
Yes, updating active: true reactivates the user.
Is SCIM available on all plans?
SCIM is an enterprise feature. Contact sales for access.
Related Articles
Was this article helpful?
Let us know if this article answered your questions.