Prerequisites
Before setting up SCIM provisioning, you need:- IdP admin access (Okta, Auth0, Microsoft Entra ID, or any other provider you’re using)
- Lovable workspace owner or admin role
- An active SSO provider configured (OIDC or SAML). See Set up single sign-on (SSO) for more information.
Why use SCIM
SCIM helps you manage workspace access centrally and reduces manual user administration. Key benefits include:- Automated provisioning: Users are automatically added to your workspace when assigned in your IdP
- Automatic deprovisioning: Users are removed when unassigned or deactivated in your IdP
- Group-based role assignment: Map IdP groups to Lovable workspace roles for automatic access control
- Single source of truth: Manage all user access from your IdP
How SCIM works in Lovable
This section explains how Lovable processes SCIM events from your identity provider.User provisioning
When your IdP creates or assigns a user to the Lovable application:- The IdP sends a SCIM request to Lovable.
- Lovable verifies that the user’s email domain is verified for your workspace.
- A new user account is created if one does not already exist.
- The user is added to your workspace with the appropriate role.
- The user receives an email invitation to join.
User deprovisioning
When your IdP removes or deactivates a user:- The IdP sends a deactivation request to Lovable.
- The user is removed from your workspace.
- The user can no longer log in to the workspace.
Workspace owners cannot be deprovisioned via SCIM. This prevents accidental lockout of workspace administration.
Group push and role updates
When group-based provisioning is enabled in your IdP:- Group membership changes are pushed to Lovable.
- Users added to a mapped group receive the corresponding role.
- Users removed from all mapped groups are removed from the workspace.
Supported SCIM operations
Lovable implements the SCIM 2.0 specification and supports the following operations:| Resource | Supported operations |
|---|---|
| Users | Create, read, update, delete, list |
| Groups | Create, read, update, delete, list, member push |
Enable SCIM provisioning
Follow these steps to enable SCIM provisioning for your workspace.1
Open identity settings and enable SCIM
Go to Settings → Workspace → Identity → SCIM provisioning and enable SCIM provisioning.
2
Copy configuration values
When SCIM is enabled, the following values are displayed:
- SCIM base URL: The endpoint your IdP uses to sync users.
- API token: A secure token used for authenticating SCIM requests (shown only once)
3
Configure your IdP
Add the SCIM base URL and API token to your identity provider’s SCIM configuration. See your IdP’s documentation for specific setup instructions.Use the following values when configuring SCIM in your IdP:
| Setting | Value |
|---|---|
| SCIM base URL | https://api.lovable.dev/scim/v2 |
| Authentication | Bearer token |
| API token | Generated when SCIM is enabled |
Provider-specific setup guides
Okta
- In the Okta Admin Console, go to Applications → Your Lovable app.
- Navigate to Provisioning → Integration.
- Enable SCIM integration.
- Configure the SCIM connector:
- SCIM connector base URL:
https://api.lovable.dev/scim/v2 - Unique identifier field:
userName - Authentication mode: HTTP header
- Authorization:
Bearer <your API token>
- SCIM connector base URL:
- Under To app, enable the provisioning features you want:
- Create users
- Update user attributes
- Deactivate users
- Save and test the connection.
Microsoft Entra ID (Azure AD)
- In the Azure portal, go to Enterprise applications → Your Lovable app.
- Select Provisioning → Get started.
- Set Provisioning mode to Automatic.
- Under Admin credentials:
- Tenant URL:
https://api.lovable.dev/scim/v2 - Secret token: your SCIM API token
- Tenant URL:
- Click Test connection to verify the setup.
- Configure attribute mappings as needed.
- Set Provisioning status to On.
Configure role mapping
SCIM supports automatic role assignment based on IdP group membership, allowing you to control workspace permissions centrally.Set a default role
The default role is assigned to users who do not match any group mapping. Available roles are:- Viewer: Read-only access
- Editor: Can create and edit projects
- Admin: Full workspace management
Map IdP groups to roles
Map your IdP groups to Lovable workspace roles for fine-grained access control. To add a group role mapping:- Go to Settings → Workspace → Identity → SCIM provisioning.
- Under Group role mappings, click Add to create a new mapping.
- Enter the Group name exactly as it appears in your IdP (for example,
engineering-admins) - Select the Role to assign (viewer, editor, or admin)
- Click Add to save.
Group names are case-insensitive. For example,
Engineering-Admins and engineering-admins both match.| IdP group | Lovable role |
|---|---|
lovable-admins | Admin |
engineering | Editor |
contractors | Viewer |
- Lovable checks whether the user belongs to any mapped groups.
- If a match is found, the corresponding role is assigned.
- If no match is found, the default role is assigned.
Manage SCIM provisioning
Use the identity settings to manage SCIM provisioning over time.Rotate the API token
Rotate the API token if it may have been compromised or needs to be regenerated:- Go to Settings → Workspace → Identity → SCIM provisioning.
- Click Rotate next to the API token.
- Confirm the rotation.
- Copy and save the new token immediately.
- Update your IdP with the new token.
Disable SCIM provisioning
To stop automatic provisioning:- Go to Settings → Workspace → Identity → SCIM provisioning.
- Disable SCIM provisioning.
Disabling SCIM stops automatic provisioning but does not remove existing workspace members. Users previously provisioned via SCIM will remain in the workspace until manually removed.
Troubleshooting
User provisioning fails with 'domain not verified' error
User provisioning fails with 'domain not verified' error
SCIM only provisions users whose email domain is verified for your workspace. To fix:
- Go to Settings → Workspace → Identity
- Add and verify the email domain under Verified domains
- Retry provisioning from your IdP.
Users are provisioned but can't log in
Users are provisioned but can't log in
Verify that:
- Your SSO provider is correctly configured.
- Users are assigned to the SSO application in your IdP.
Role mappings are not being applied
Role mappings are not being applied
Check that:
- Group names in your mappings exactly match what your IdP sends (case-insensitive)
- Your IdP is configured to send group membership data in SCIM requests
- Group push is enabled in your IdP
FAQ
Can I use SCIM without SSO?
Can I use SCIM without SSO?
No, SCIM requires an active SSO provider. Users provisioned via SCIM authenticate using your configured SSO provider.
What happens to existing users when I enable SCIM?
What happens to existing users when I enable SCIM?
Existing workspace members are not affected when you enable SCIM. SCIM manages users provisioned through your IdP. Previously invited users continue to exist alongside SCIM-provisioned users.
I lost my API token. What should I do?
I lost my API token. What should I do?
The API token is only shown once when generated. If you’ve lost it:
- Go to Settings → Workspace → Identity → SCIM provisioning.
- Click Rotate next to the API token and confirm the rotation.
- Update your IdP with the new token.