Identity and Provisioning APIs
Identity APIs span three areas:- OAuth 2.0 provider and OAuth app management
- SAML SSO connection and login flow
- SCIM 2.0 directory/user/group provisioning
OAuth provider endpoints
GET /oauth/authorizePOST /oauth/authorizePOST /oauth/tokenGET /oauth/userinfoPOST /oauth/revoke
GET /oauth/appsPOST /oauth/appsGET /oauth/apps/:idPATCH /oauth/apps/:idDELETE /oauth/apps/:idPOST /oauth/apps/:id/rotate-secret
- Authorization Code flow with optional/required PKCE (per app settings).
- Scope validation against app-allowed scopes.
- Role-aware granted scope trimming at consent time.
- Token endpoint supports
authorization_codeandrefresh_token. - UserInfo requires valid access token with
user.readscope. - Revocation follows RFC-style idempotent behavior.
SAML endpoints
GET /saml/metadata/:workspaceIdPOST /saml/connectionsGET /saml/connectionsPATCH /saml/connections/:idDELETE /saml/connections/:idPATCH /saml/enforceGET /saml/authorize/:workspaceIdPOST /saml/callbackGET /saml/checkGET /saml/logout/:workspaceIdPOST /saml/logout/callbackGET /saml/logout/callback
- Workspace admin setup only.
- Enterprise plan required.
- Supports metadata-based or manual IdP configuration.
- Enforce mode requires valid corporate allowed domains.
- Assertion replay defenses and certificate validation are applied server-side.
SCIM endpoints
Directory management:POST /scim/directoriesGET /scim/directoriesPATCH /scim/directories/:idDELETE /scim/directories/:idPOST /scim/directories/:id/regenerate-token
GET /scim/v2/ServiceProviderConfigGET /scim/v2/ResourceTypesGET /scim/v2/SchemasGET|POST /scim/v2/UsersGET|PUT|PATCH|DELETE /scim/v2/Users/:idGET|POST /scim/v2/GroupsGET|PUT|PATCH|DELETE /scim/v2/Groups/:id
/scim/directories/*endpoints are workspace-admin management APIs.- SCIM provisioning routes (
/scim/v2/*) use bearer token auth tied to the SCIM directory. - User provisioning can auto-create workspace members and auto-deactivate/remove on IdP deactivation.
- Group provisioning supports full replace and PATCH member add/remove operations.
Availability and access
- SAML and SCIM are enterprise-focused capabilities.
- OAuth app management requires integration read/manage permissions.
- SAML and SCIM management require workspace admin/owner scope.
- SCIM provisioning endpoints use bearer-token authentication from your IdP (no dashboard session cookie).
- CSRF protection applies to state-changing management routes.
Typical failures
400/422invalid OAuth/SAML/SCIM payloads401invalid client credentials, bearer tokens, or session state403plan or permission restrictions404unknown connection/app/directory/resource IDs409duplicate OAuth app/SCIM user/group uniqueness conflicts
/user-guides/manual/workspace/security-and-compliance/api-reference/auth/overview/api-reference/identity/oauth-apps-and-provider/api-reference/identity/saml-sso/api-reference/identity/scim-provisioning

