Setting up SCIM provisioning
If Single Sign-On (SSO) is used in your SonarQube Cloud enterprise for user authentication, you can set up SCIM to automate provisioning. SCIM provisioning is supported with any identity provider.
SCIM provisioning is a beta feature, subject to the terms here.
Currently, only user deprovisioning is supported. For more information about the provisioning feature, see About SCIM provisioning.
To set up SCIM deprovisioning in your enterprise, you must be the administrator of the enterprise in SonarQube Cloud. Follow the steps below.
Start the SCIM provisioning setup assistant
Retrieve your enterprise. For more information, see Retrieving and viewing your enterprise.
Go to Administration > SSO & Provisioning.

In the top right corner, select the Edit Configuration button. If this button is not available, you must first set up SSO in your enterprise: see Setting up SSO. The Configure Your Connection page opens.

Before setting up SCIM provisioning, you must resolve any warnings notified on this page for Single Sign-On! If it’s the case, select Single Sign-On and follow the instructions of the setup assistant. For more information, see Troubleshooting SSO connection.
Note that the attribute mapping was changed recently. If your SSO setup was performed before this change, a warning will be displayed. In that case, follow the instructions to update your mapping in SonarQube Cloud. Check also the attribute mapping in your identity provider to make sure it matches the new SonarQube Cloud's mapping. For more information, see Create and set up the SonarQube Cloud application in your identity provider.
Select Provisioning. The SCIM provisioning setup assistant opens.

Set up SCIM provisioning in your identity provider
In this step, you will configure your identity provider’s application for SonarQube Cloud by copying values from SonarQube Cloud’s SCIM provisioning setup assistant. The configuration depends on your identity provider.
With Okta
In Okta, open the application used to manage Single Sign-On in SonarQube Cloud.
In the General tab, in App Settings, select Edit.
In Provisioning, select SCIM and save. The Provisioning tab is added to your application.

Open the Provisioning tab.
In SCIM Connection, set the parameters as explained in the table below.
SCIM connector base URL
Copy-paste the Provisioning Endpoint URL from SonarQube Cloud’s setup assistant.
Unique identifier field for users
Copy-paste the User ID attribute value in Required attributes from SonarQube Cloud’s setup assistant.
Supported provisioning actions
Select the following options:
Import New Users and Profile Updates
Push New Users
Push Profile Updates
Authentication Mode
HTTP Header
In SonarQube Cloud’s SCIM provisioning setup assistant, select Generate Token in the Bearer Token section.
Copy the generated token.

In your identity provider, in the HTTP Header section, paste the token into Bearer.

Select Test Connector Configuration. The test starts. Note that only user deprovisioning is currently supported in SonarQube Cloud.

Close the test configuration window.
Select Save.
In SonarQube Cloud’s SCIM provisioning setup assistant, select Done.
With Microsoft Entra ID
In Microsoft Entra ID, go to Identity > Applications > Enterprise applications > All applications and select the application created for SonarQube Cloud.
On the application’s page, select Provisioning in the left-hand side menu.
In the top menu bar, select New configuration.

In Admin credentials, set the fields as described in the table below.
Select authentication method
Select Bearer authentication
Tenant URL
Copy-paste the Provisioning Endpoint URL from SonarQube Cloud’s setup assistant.
Warning: Currently, you have to follow the additional step defined in Flags to alter the SCIM behavior and add ?aadOptscim062020 to the end of the URL value.
Secret token
In SonarQube Cloud’s SCIM provisioning setup assistant, select Generate Token in the Bearer Token section.
Copy the generated token and paste it to this field.

Select the Test connection button. You should see a success pop-up at the top right corner of the page.

Select the Create button.
In the left-hand side menu, select Attribute mapping.

Select Provision Microsoft Entra ID Groups. The Attribute Mapping dialog for groups opens.
In the dialog, disable the feature and save.

Return to the previous page and select Provision Microsoft Entra ID Users. The Attribute Mapping dialog for users opens.
Ensure the feature is enabled and the Create, Update and Delete actions are selected in Target Object Actions.

In Attribute Mappings , map the
userNamecustomappsso Attribute (target) to the Microsoft Entra ID Attribute (source) used as SAML user login attribute in your SAML configuration. For example, if your login attribute ishttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressin your SonarQube Server’s SAML configuration and it is mapped touser.userprincipalname(default), useuserprincipalnamehere. Otherwise, if it is mapped touser.mail, then usemailinstead.

Click Save. This takes you back to the Provisioning page.
Ensure that Provisioning Mode is Automatic.
Open the Settings section and in the Scope subsection, select Sync only assigned users and groups.

Set the Provisioning Status to On and click Save.
Go back to the Overview page and select the Start provisioning button.

In SonarQube Cloud’s SCIM provisioning setup assistant, select Done.
Microsoft Entra ID runs a SCIM synchronization every 40 minutes. Changes in Microsoft Entra ID are not reflected immediately in SonarQube Cloud.
With JumpCloud
In JumpCloud, open the application used to manage Single Sign-On in SonarQube Cloud and open the Identity Management tab.
In Configuration Settings > Service Provider (SP) Configuration set the fields as explained in the table below.
API Type
Select SCIM API.
SCIM Version
Select SCIM 2.0.
Base URL
Copy-paste the Provisioning Endpoint URL from SonarQube Cloud’s setup assistant.
Remove the trailing slash from the URL. This step is very important. The SCIM connection will fail if the URL has a trailing slash.
Token Key
In SonarQube Cloud’s SCIM provisioning setup assistant, select Generate Token in the Bearer Token section. Copy the generated token and paste it to this field.
Test User Email
Enter any email address.

Make sure you remove the trailing slash from the base URL. The figure below shows the trailing slash.

Select the Test Connection button. If the test was successful, proceed with the setup.
Unselect the Enable management of User Groups and Group Membership in this application option, and select Activate.

In SonarQube Cloud’s SCIM provisioning setup assistant, select Done.
Enable the SSO connection with SCIM
Once you have enabled the connection to your identity provider, you users will be able to authenticate to SonarQube Cloud through SSO and SCIM provisioning will apply.
To enable the connection to your identity provider:
In SonarQube Cloud's Configure Your Connection page, select Enable connection. A confirmation dialog opens.

Select Proceed.
Related pages
Last updated
Was this helpful?

