Automated User Provisioning requires a Business or Enterprise plan. For Microsoft-only environments, Directory Sync (Entra ID) is available on Pro plans.
Before you start
You’ll need:| Requirement | Detail |
|---|---|
| Business or Enterprise plan | Automated provisioning is a Business+ feature |
| Identity provider with SCIM support | Okta, Microsoft Entra ID, PingOne, OneLogin, JumpCloud, or any SCIM 2.0 compliant provider |
| Admin access to your IdP | You’ll need to create a SCIM application and paste in credentials |
| A Master List | The list where provisioned people will appear |
Supported identity providers
| Provider | Status | Notes |
|---|---|---|
| Okta | Fully tested | SWA application with SCIM provisioning enabled |
| Microsoft Entra ID | Compatible | Requires Entra P1 or P2 licence for SCIM provisioning |
| PingOne | Compatible | Standard SCIM 2.0 connector |
| OneLogin | Compatible | Standard SCIM 2.0 connector |
| JumpCloud | Compatible | Requires paid Identity Management feature |
SCIM vs Directory Sync — which should I use?
| Directory Sync (Entra ID) | Automated Provisioning (SCIM) | |
|---|---|---|
| Direction | CaptrID pulls from Microsoft | Your IdP pushes to CaptrID |
| Providers | Microsoft Entra ID only | Any SCIM 2.0 provider |
| Timing | Manual or scheduled sync | Real-time (seconds after IdP change) |
| Plan | Pro+ | Business+ |
| Best for | Microsoft-only environments | Multi-vendor IdPs, real-time needs |
Step 1: Connect your Master List
- Open your Master List
- Go to the Sync tab
- You’ll see two provider cards — click Automated User Provisioning
- In the connect dialog, choose a Unique Identifier:
| Option | Example | Best for |
|---|---|---|
| Employee Number | EMP001 | Organisations with stable employee/student IDs |
| Username | jsmith | When employee numbers aren’t available |
jane@example.com | Simple setups where email is the primary identifier |
- Click Connect

CaptrID also stores the IdP’s internal identifier separately as a sync anchor. This means people are reliably matched even if their visible ID changes — but changing UID can still cause confusion, so pick a stable one.
Step 2: Generate a bearer token
After connecting, the Sync tab shows your SCIM configuration. You need to generate a token for your IdP:- In the Bearer Tokens section, click Generate Token
- Copy both values:
- SCIM Base URL — the endpoint URL your IdP will send requests to
- Bearer Token — the authentication credential

Step 3: Configure your identity provider
In your IdP’s admin console, create a SCIM application and enter the URL and token from Step 2. The exact steps vary by provider, but the general pattern is:- Create a new application (SCIM or custom connector type)
- Set the SCIM Base URL (sometimes called “SCIM connector URL” or “Tenant URL”)
- Set the Bearer Token (sometimes called “Secret Token” or “API Token”)
- Set authentication mode to HTTP Header (Bearer token)
- Assign users or groups to the application
Step 4: Assign users
In your IdP, assign individual users or groups to the SCIM application. Assigned users are provisioned to your CaptrID Master List automatically:- New assignments create people in the Master List
- Attribute changes update the corresponding fields
- Unassignments or deactivations deactivate the person in the Master List
Managing field mappings
CaptrID creates sensible default mappings, but you can customise which IdP attributes map to which Master List fields.- In the Sync tab, click Configure Mappings
- The full-screen mapping editor shows fields grouped by category:
- Name — given name, family name, display name
- Contact — emails, phone numbers
- Organisation — department, job title, employee number
- Account — username, active status
- Toggle mappings on or off, or change which Master List field each attribute maps to
- Click Save

You can map up to 27 IdP attributes to Master List fields, including name components, multiple email addresses, phone numbers, addresses, organisation details, and custom extension attributes.
Viewing the provisioning log
Every create, update, and deactivate operation from your IdP is logged. To view the log:- Open the Master List → Sync tab
- Scroll to the Provisioning Log section

Managing tokens
Each Master List has its own bearer tokens. You can have multiple active tokens per list (useful for rotating credentials without downtime).Generating additional tokens
Click Generate Token in the Bearer Tokens section. Each new token works independently alongside existing ones.Revoking a token
- Find the token in the Bearer Tokens list (identified by its prefix, e.g.
sct_a1b2...) - Click Revoke
- Confirm the action
401 Unauthorised errors until you update it with a new token.
Syncing different groups to different lists
To sync different IdP groups to different Master Lists (e.g. Staff and Students):- Create a separate Master List for each group
- Connect SCIM on each list and generate a token for each
- In your IdP, create a separate SCIM application for each list
- Assign the relevant group to each application
Disconnecting
To stop SCIM provisioning on a Master List:- Open the Master List → Sync tab
- Click Disconnect
- Confirm the action
- All active tokens for this list are revoked
- Your IdP will receive
401errors on its next provisioning attempt - All existing people remain in the Master List — nothing is deleted
- Previously synced fields become editable
- You can reconnect and set up provisioning again later
IdP setup guides
Okta
- In Okta Admin Console, go to Applications → Create App Integration
- Select SWA - Secure Web Authentication
- Give the app a name (e.g. “CaptrID Staff Roster”)
- After creating the app, go to the General tab → App Settings → Edit
- Under Provisioning, select SCIM
- Go to the Provisioning tab → Integration → Edit
- Enter:
- SCIM connector base URL — paste the SCIM Base URL from CaptrID
- Unique identifier field for users —
userName - Authentication Mode — HTTP Header
- Authorization — paste the Bearer Token from CaptrID
- Click Test Connector Configuration — verify it connects successfully
- Under Provisioning → To App, enable:
- Create Users
- Update User Attributes
- Deactivate Users
- Go to the Assignments tab and assign users or groups
Microsoft Entra ID
Entra ID SCIM provisioning requires a Microsoft Entra P1 or P2 licence (included in Microsoft 365 E3/E5). If you only have basic Entra, use Directory Sync instead — it works on all Entra tiers.
- In the Azure portal, go to Microsoft Entra ID → Enterprise Applications
- Click New application → Create your own application
- Name it (e.g. “CaptrID Provisioning”) and select Integrate any other application not found in the gallery
- Go to Provisioning → Get started
- Set Provisioning Mode to Automatic
- Under Admin Credentials, enter:
- Tenant URL — paste the SCIM Base URL from CaptrID
- Secret Token — paste the Bearer Token from CaptrID
- Click Test Connection — verify it connects successfully
- Click Save
- Under Mappings, review the attribute mappings (Entra’s defaults usually work well)
- Go to Users and groups and assign users or groups
- Set Provisioning Status to On and click Save
JumpCloud
- In the JumpCloud Admin Console, go to SSO Applications → Add New Application
- Search for “Custom SCIM” or create a Custom Application
- Under Identity Management → Configuration:
- Base URL — paste the SCIM Base URL from CaptrID
- Token Key — paste the Bearer Token from CaptrID
- Click Test Connection
- Under Identity Management, enable user provisioning
- Go to the User Groups tab and assign groups
JumpCloud requires a paid plan with Identity Management enabled for SCIM provisioning.
Frequently asked questions
Can I use both Entra Directory Sync and SCIM on the same list? No — they’re mutually exclusive. One sync provider per Master List. Use Entra Directory Sync for pulling from Microsoft, or SCIM for having any IdP push to you. Does SCIM sync photos? No — identity providers don’t send photos via SCIM. Photos flow into CaptrID through sessions, self-upload links, or admin upload. What fields are synced by default? First Name, Last Name, Email, Display Name, Employee Number, Primary Email, Phone, Job Title, and Department. You can add, remove, or remap fields via the Configure Mappings editor. What happens if someone’s data changes in the IdP? The change is pushed to CaptrID automatically. The corresponding Master List fields are updated. Local-only fields (not mapped to the IdP) are never affected. What happens if someone is removed or deactivated in the IdP? They’re deactivated in your Master List — not deleted. You can view deactivated people by switching the status filter to “Inactive” and reactivate them if needed. Can I edit synced people manually? Fields mapped to the IdP are locked to prevent manual edits being overwritten. You can still edit unmapped fields, and use synced people in sessions where edits are made on the session copy.Troubleshooting
| Issue | Cause | Solution |
|---|---|---|
| ”401 Unauthorised” from IdP | Invalid or revoked bearer token | Generate a new token in CaptrID and update your IdP configuration |
| People not appearing after assignment | IdP hasn’t pushed yet, or provisioning isn’t enabled | Check provisioning is enabled in the IdP app. Some providers batch changes (Entra: ~40 min). Try “Provision on demand” if available. |
| Duplicate people in the list | UID changed between provisions, or token pointed at wrong list | Verify the SCIM Base URL matches the correct Master List. Check the UID field hasn’t changed in the IdP. |
| Fields showing unexpected values | Field mapping mismatch | Open Configure Mappings and verify the IdP attributes are mapped to the correct Master List fields |
| ”Connection failed” during IdP test | Network or URL issue | Verify the SCIM Base URL is correct and includes the full path. Check your IdP can reach the internet. |
| Changes not propagating | IdP batching or provisioning paused | Check IdP provisioning status. Entra ID batches every ~40 minutes. Okta provisions near-instantly. |