How It Works
Draftt acts as the SCIM service provider. Your identity provider acts as the SCIM client, pushing user and group changes to Draftt via the SCIM 2.0 API. The sync handles three lifecycle events:- Provision - User is created in Draftt when added to a mapped group in your IdP.
- Update - Profile changes (name, email) in your IdP are synced to Draftt.
- Deprovision - User is deactivated in Draftt when removed from all mapped groups or deactivated in your IdP. Deactivated users lose access immediately but their data (ownership assignments, audit records) is preserved.
SCIM requires SSO to be configured first. Provisioned users authenticate via your IdP, not via a Draftt password.
Setup
To enable SCIM provisioning, go to Settings > User Management > SCIM Provisioning in Draftt. Generate a SCIM token and copy your SCIM base URL. Both are needed to configure your identity provider. Contact your Draftt account team if you need guidance for your specific IdP.Group-to-Role Mapping
By default, SCIM-provisioned users receive the role configured in Settings > User Management > SCIM Provisioning > Default Role, typicallyDeveloper or Viewer.
For finer control, configure group-to-role mappings. Each IdP group is mapped to a Draftt role. A user in multiple mapped groups receives the highest-privilege matching role.
| IdP Group | Draftt Role |
|---|---|
draftt-admins | Admin |
draftt-engineering | Developer |
draftt-stakeholders | Viewer |
Deprovisioning Behavior
When a user is deactivated in your IdP or removed from all mapped groups, Draftt:- Immediately revokes their active sessions.
- Sets their account status to Inactive in Draftt.
- Preserves all data associated with their account: ownership assignments, audit log entries, policy attributions.
Verifying Your SCIM Setup
After configuring your IdP:- Go to Settings > User Management > SCIM Provisioning in Draftt.
- Confirm the Last sync timestamp updates after your IdP runs a sync.
- Check Settings > User Management > Users to verify provisioned users appear with the expected roles.
Next Steps
- Review Roles & Permissions to define the right role defaults for SCIM-provisioned users
- Set up SSO if not already configured. SCIM requires SSO.