1) Select the correct tenant
- Log in to the KZero Admin Dashboard
- Select the appropriate tenant
MSP tip: Always double-check the tenant before enabling SCIM.
2) Enable the SCIM endpoint
From the left navigation menu:
- Click Integrations
- Click SCIM
- Enable Endpoint Configuration
Once enabled, the SCIM configuration panel appears.
3) Understanding the configuration fields
🧩 Profile
Options: Generic, Azure
- Generic → Recommended in most cases
- Azure → Use only when integrating specifically with Microsoft Entra ID
If unsure, choose Generic.
🔐 Use Remote Token Authentication
When enabled, SCIM uses OAuth 2.0 (Client Credentials flow) with a Client ID and Client Secret.
🟢 Recommended for production environments
🟠 Optional in test environments
- Requires the Token Endpoint
🔷 Integration details (generated by KZero)
🌐 SCIM Endpoint (Mandatory)
https://ca.auth.kzero.com/realms/<TENANT_NAME>/scim/v2
Used to create, update, and deactivate users (and groups if supported).
🎟 Token Endpoint (Required if Remote Token Authentication is enabled)
https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/openid-connect/token
Used by the application to request an access token.
🆔 Client ID (Required if Remote Token Authentication is enabled)
Provided by KZero in your dashboard.
🔑 Client Secret (Required if Remote Token Authentication is enabled)
Provided by KZero. Treat it like a password and store it securely.
🔍 What is mandatory vs optional?
Always required:
- Profile
- SCIM Endpoint
Required only if Remote Token Authentication is enabled:
- Token Endpoint
- Client ID
- Client Secret
If Remote Token Authentication is disabled, some applications may use a simpler provisioning method.