Note
As a prerequisite, this feature requires completed Domain Verification (DV).
SCIM 2.0 (System for Cross-domain Identity Management) is an industry-standard protocol that enables identity providers (IdPs), such as Okta or Microsoft Entra, to manage access to Samsara resources. SCIM 2.0 can automatically add new users, update user information, and delete users from the system if they leave. This helps keep user access accurate, improves internal security, and reduces the need for manual updates by administrators.
While Single Sign-On (SSO) Authentication confirms user identity at sign-in, SCIM ensures that only the right users exist in the system in the first place. SCIM 2.0 can also create and configure user accounts, such as their assigned role, before they sign-in for the first time through SSO.
To set up SCIM 2.0 for your organization, select a workflow:
Samsara supports SCIM 2.0 for Okta. You must be integrated with Okta as your IdP to use SCIM 2.0 for Okta. Use the following workflow to set up SCIM 2.0 for Okta:
-
From the Samsara dashboard, navigate to Settings (
) > Organization > Single Sign On.
-
Toggle on Enable SCIM.
-
In your Okta Admin Console, navigate to the app you use to manage access to Samsara.
-
Under General, select the SCIM option in Provisioning.
-
Save.
-
Under Provisioning, select Integration and configure your SCIM Connection:
-
Enter your SCIM endpoint into the SCIM connector base URL.
-
For the Authentication Mode, ensure HTTP Header is selected.
-
Open a new window and return to the Samsara dashboard to copy the Bearer Token from SCIM settings located in Settings (
) > Organization > Single Sign On.
-
Return to the Okta Admin Console and paste the Bearer Token into the field for Authorization.
-
Click Test Connector Configuration to confirm the connection is successful.
-
After the connection succeeds, Save.
-
-
While still under Provisioning, select To App and click Edit:
-
Ensure that Create Users, Update User Attributes and Deactivate Users are enabled.
-
Save.
-
Scroll down and select Go to Profile Editor.
-
In the Profile Editor, click + Add Attribute and enter the following fields entries:
Attribute
Field Entry
Example
Data type
string arrayDisplay name
Samsara Dashboard RolesVariable name
samsaraRolesExternal name
rolesListEnum
Select Define enumerated list of values
Attribute members
Enter every role for your organization.
If you want to target roles with tags user the following format: Full Admin tags:warehouse,dock
Display name: Full Admin, Value: Full Admin
Attributes required
Select Yes
External namespace
urn:ietf:params:scim:schemas:core:2.0:User
-
Save.
After you save, configuration for SCIM 2.0 between Okta and Samsara is complete.
-
Samsara supports SCIM 2.0 for Entra. You must be integrated with Entra as your IdP to use SCIM 2.0 for Entra. Use the following workflow to set up SCIM 2.0 for Entra:
-
Sign in to Azure and perform a search for
Entra ID, then select Microsoft Entra ID.Then, perform the following steps within Azure:
-
From the Samsara dashboard, navigate to Settings (
) > Organization > Single Sign On.
-
Toggle on Enable SCIM.
Bearer Token and SCIM Endpoint for EntraID fields will be used in the next step.
-
Copy the SCIM Endpoint for EntraID from your Samsara dashboard, and then paste it in the Tenant URL field in Entra.
-
Copy the Bearer Token from your Samsara dashboard and paste it in the Secret token field in Entra.
-
Within Entra, continue the following steps:
-
Select Test connection.
When successful a pop-up will display confirming the test was successful.
-
Click Create.
-
Upon successful creation, you are directed to Overview. Select Attribute mapping (Preview).
Then, perform the following steps within Attribute Mapping:
-
Check Show advanced options, and then click Edit attribute list for customappsso.
-
Add a new attribute with the Name
roles, Typestring, and have Multi-Value checked. -
Save.
-
Click Add New Mapping to map the roles attribute you just created.
-
In Edit Attribute:
-
From the Mapping type drop down, select Expression.
-
In the Expression field, input
AppRoleAssignmentsComplex([appRoleAssignments]). -
From the Target attribute drop down, select roles.
-
-
Select Ok.
-
Save.
This is what the Attribute Mapping table must look like:
If any rows are missing, the SCIM connection won't work. If any rows are missing, or if the values under CustomAppSSO Attribute or Microsoft Entra ID Attribute differ from what is displayed, click Edit to modify the entry, or Add New Mapping to create it and then Save.
If there are any additional request attributes not accepted by the Samsara SCIM schema, the SCIM connection won’t work. Some attributes are automatically set by Entra.
-
-
Navigate to Provisioning enable the Provisioning Status to On.
-
Save.
After this step, you can create roles and assignments within Entra.
-
After you complete the final step in Configure SCIM 2.0 for Microsoft Entra, you can create roles and assign them in the app you made in Entra. Roles are created in the app you created in Entra, under App Roles.
The Display name should match the Samsara dashboard name, and the Value should be the base64 encoded role name.
To pass tags within a role, append tags:<tag1,tag2> in the Display name. For example, if you have a Full Admin role in a tag named warehouse, you would input the following in Display name: Full Admin tags:warehouse. The Value should be the same base64 encoded string.
These roles can be assigned to users by creating app assignments through Users and groups > + Add user/group.
Note
At this time, Samsara only supports user provisioning. Groups cannot be provisioned.
For a quick test, go to Provision on demand, and try to provision a user. If successful, the user is created or updated in the Samsara dashboard with the assigned role.

Comments
0 comments
Article is closed for comments.