All pages
Powered by GitBook
1 of 3

Loading...

Loading...

Loading...

SCIM Provisioning

Automate user lifecycle management from your Identity Provider (IdP) with user and group provisioning through SCIM 2.0.

Overview

Veza's SCIM API provides a powerful automation tool to manage user access throughout the identity lifecycle. When an employee joins, changes roles, or leaves your organization, these changes can automatically propagate to Veza, maintaining access control while reducing administrative overhead.

The SCIM (System for Cross-domain Identity Management) protocol is an open standard for automating user provisioning between identity providers and applications. Veza exposes a standards-compliant SCIM 2.0 API at https://{tenant}.vezacloud.com/scim/v2.

Supported identity providers

Veza supports SCIM 2.0 integration with:

  • Microsoft Entra ID (formerly Azure AD)

Enabling SCIM provisioning

Before implementing SCIM provisioning, ensure you understand the prerequisites and process flow. This integration requires administrator access to both Veza and your identity provider, as well as a dedicated service account for secure API communication.

The implementation follows these key steps:

  1. Create a dedicated admin user in Veza with SCIM Provisioner privileges

  2. Generate and securely store an API key for your identity provider to authenticate

  3. Enable SCIM provisioning in Veza's administration settings

  4. Configure your identity provider with Veza's SCIM endpoint and authentication details

For identity provider-specific instructions, follow our detailed guide for .

Important notes for SCIM Provisioning

When enabling SCIM, there are some critical behaviors to be aware of:

  • SAML and SCIM interaction: When you enable SCIM provisioning, Veza automatically disables SAML Just-in-Time (JIT) provisioning to prevent potential conflicts. User profile updates now come exclusively from your identity provider through SCIM.

  • Group-to-role mapping: Veza maps each identity provider group to one or more team/role assignments in Veza. When a user's group membership changes in your IdP, Veza automatically updates their team/role assignments.

  • Permission persistence: If a user has the same permission from multiple groups, that permission remains until you remove the user from all groups granting that access. For example, if a user belongs to two groups that both assign Admin roles, removing them from only one group will not revoke their Admin permissions.

SCIM User Lifecycle Automation Flow

Additional resources

  • - SCIM API endpoints and schema documentation

  • - Create and manage API keys

  • - Configure SAML SSO

  • - More information about Veza teams and role assignments

Enable push groups to align identity provider groups with Veza teams and roles

  • Validate the integration by testing the full provisioning lifecycle

  • Okta
    Okta
    SCIM API Reference
    API Authentication
    Single Sign-On Configuration
    Team Management

    SCIM API Reference

    APIs for automating user and group provisioning.

    Veza's SCIM 2.0 API enables automated user provisioning and management through your identity provider (IdP). This reference documents the API endpoints, request/response formats, and authentication requirements.

    About This API

    • Version: 2.0

    • Base URL: https://{tenant}.vezacloud.com/scim/v2

    • Protocol: HTTPS only

    • Data Format: JSON

    • Authentication: Bearer token

    • Query Limit: 200 requests per minute

    Compliance

    This API implements the SCIM 2.0 protocol specifications:

    • - SCIM Core Schema

    • - SCIM Protocol

    Resource Types

    The API supports the following SCIM resource types:

    Resource
    Description
    Endpoints

    Authentication

    All API requests require authentication using a bearer token in the Authorization header:

    API keys are generated in the Veza Administration console. See for details on creating and managing API keys.

    Security Considerations

    • Store and transmit API keys securely as they have administrative privileges

    • All connections must use TLS 1.2 or higher

    • SCIM API access should be restricted to your IdP's dedicated service account

    • You can implement monitoring using Veza APIs or event subscriptions for unexpected provisioning or deprovisioning activities

    Error Handling

    The API returns standard HTTP status codes and a SCIM-compliant error response:

    SCIM Endpoints

    Important notes:

    • All user management should be performed through your IdP once SCIM is enabled

    • At least one admin user must exist on the root team as a break glass account

    • Filtering operations are limited to equality (EQ) comparisons

    • Error responses follow the SCIM error schema

    Create Group

    The displayName attribute is required for group creation.

    Delete Group

    Deleting a group removes it from Veza but does not affect the source group in your IdP.

    List Groups

    • Maximum of 200 groups returned per request

    • Filtering is limited to equality operations (EQ)

    Get Schema

    Returns the SCIM schema definition supported by Veza.

    Create User

    Required attributes:

    • givenName

    • familyName

    • userName (must match email address)

    Additional requirements:

    • Email attribute must be marked as primary

    • Groups cannot be specified with group metadata

    • When using SAML JIT, changing the email address may result in a new user being provisioned

    List Resource Types

    Returns the resource types supported by the SCIM implementation.

    Get Users

    Returns a list of provisioned users.

    Patch Group

    Only the following attributes can be modified:

    • displayName

    • members

    • externalId

    Patch User

    Updates specific attributes of a user's metadata.

    • Veza does not accept password changes

    • When Veza receives an update for a local user account, the account is converted to an SSO account. Going forward, the user must sign into their SSO provider.

    Update User

    Replaces a user's metadata entirely. Note:

    • Email attribute must be marked as primary

    • SCIM-provisioned users cannot change their details in Veza

    • Username must match email address

    • The request cannot include groups information

    Get Service Provider Configuration

    Returns the SCIM service provider configuration.

    Delete User

    Deactivates the user in Veza. User management should be performed through your IdP once SCIM is enabled.

    ResourceTypes

    Available resource types

    /ResourceTypes

    Dates use ISO 8601 format

    displayName
    Veza does not accept password changes
  • When Veza receives an update for a local user account, the account is converted to an SSO account. Going forward, the user must sign into their SSO provider.

  • Users

    Individual user accounts

    /Users

    Groups

    User groups mapped to Veza Teams

    /Groups

    Schemas

    Resource type definitions

    /Schemas

    ServiceProviderConfig

    Service provider configuration

    RFC 7643
    RFC 7644
    Authentication

    /ServiceProviderConfig

    Authorization: Bearer YOUR_API_KEY
    {
      "schemas": ["urn:ietf:params:scim:api:messages:2.0:Error"],
      "status": "400",
      "scimType": "invalidValue",
      "detail": "Email must be marked as primary"
    }

    SCIM Provisioning with Okta

    Step-by-step guide for configuring automated user provisioning between Okta and Veza using SCIM 2.0.

    This guide explains how to configure Okta as your identity provider (IdP) for secure, automated user provisioning with Veza. Following these steps will establish a connection between Okta and Veza for managing the complete user lifecycle including account provisioning and deprovisioning.

    Notes on SCIM Provisioning

    Veza supports the following SCIM provisioning features:

    Feature
    Description

    When using SCIM provisioning, Veza implements the following critical security behaviors that administrators should understand:

    SCIM with SAML SSO: When SCIM provisioning is enabled in Veza Sign-In Settings, Veza no longer synchronizes user profiles during SAML logins (SAML JIT and SAML metadata sync is disabled).

    Group-to-Role Mapping Behavior: Each unique push group from Okta is mapped to one or more team/role assignments in Veza. When a user is provisioned or their group membership changes, this role mapping is automatically applied to create or update the corresponding team/role assignments.

    Permission Persistence: Users can receive the same permission from multiple IdP groups. Veza preserves permissions until all sources are removed. For example, if a user belongs to two different IdP groups that both assign Root/Admin roles in Veza, removing the user from only one of these groups will not revoke their Root/Admin permissions. The user will retain these permissions until removed from all groups granting access.

    Prerequisites

    Ensure you maintain at least one local admin account on the root team as a break glass account. This account provides access if there are issues with your identity provider connection.

    To enable SCIM provisioning with Okta, you will need:

    • Administrator access to both Veza and Okta

    • An understanding of your organization's access control requirements

    • HTTPS access to your Veza instance

    • An Okta version that supports SCIM 2.0

    You will need a dedicated local admin user in Veza for SCIM configuration, created during setup.

    Important Considerations:

    • At least one admin user must exist on the root team (break glass account)

    • Once SCIM is enabled, all user management must be performed through Okta

    • Okta User names must be the same as the user's email address

    • Queries are limited to returning a maximum of 200 items at a time

    Enabling SCIM Provisioning with Okta

    1. Create a SCIM Admin User in Veza

    1. Go to Administration > User Management and create a new Veza user:

    2. Assign the user to the root team with the following roles:

      • Admin is required for user management.

      • SCIM Provisioner is required to access Veza SCIM endpoints.

    See for more on adding local user accounts to Veza.

    2. Create an API Key and enable SCIM provisioning

    1. Sign in as the newly created SCIM admin user

    2. Navigate to Administration > API Keys

    3. Create a new API key:

      • This is a personal API key for the SCIM admin user

    3. Configure Okta

    1. In your Okta Admin Console, navigate to Applications > Applications

    2. Click Create App Integration

    3. Select SCIM as the sign-in method

    4. Configure the app with the following settings:

    4. Configure Group Push and Permissions

    To log in to Veza, Okta users must be members of push groups assigned to the Veza application:

    1. In Okta:

      • Create or identify the groups that will be used for Veza access

      • Assign users to these groups

      • Navigate to your Veza application

    See for more about pushing existing Okta groups with SCIM.

    In Veza:

    • Verify provisioned groups appear on the Administration > Team Management page

    • For each team:

      1. Click on the team to view details

      2. To change roles for a user, click Change Roles in the Actions column.

    Team and role assignments determine user permissions within Veza. See for more information.

    Groups are shown in Veza under the SAML configuration details. Click "Configure" on the Administration > Sign-in Settings page to view the pushed groups:

    Users must be both assigned to the Veza application AND be members of a pushed group to be provisioned successfully.

    5. Role Management in Okta

    When using SCIM provisioning with Veza:

    1. You can use your existing Okta groups for provisioning users and teams to Veza.

    2. For proper role assignment, ensure the groups pushed through SCIM match the groups configured in your Veza SSO settings:

      • Navigate to Administration > Sign-in Settings in Veza

      • Click "Configure" on your SAML connection

    Validation

    1. in Okta, test the connector configuration:

      • Click Test Connector Configuration for the app integration

      • Verify the successful connection:

    2. Verify user provisioning:

    User Deprovisioning

    To remove users from Veza:

    1. In Okta:

      • Remove the user from all pushed groups

      • Unassign the user from the Veza application

    2. In Veza:

    To remove groups:

    1. In Okta:

      • Remove the group from the SCIM application's Push Groups tab

    Troubleshooting

    Users or Groups not syncing

    • Verify the user is assigned to the Veza application in Okta

    • Confirm user is a member of at least one pushed group

    • Check user's email matches their username

    • Review Okta Dashboard Tasks for provisioning errors

    API authentication failures

    • Verify the API key is correctly copied to Okta

    • Confirm that SCIM is enabled on the Veza Sign-in Settings page.

    • Ensure your Veza instance is accessible via HTTPS

    Getting help

    For additional assistance, please contact Veza Support and provide the following information if available:

    • Okta System Log and Dashboard Tasks entries

    • Veza error messages

    • Timeline of the issue

    • Steps to reproduce

    Veza creates Teams from groups provisioned through SCIM. Permissions are managed by assigning roles to teams provisioned in Veza.

    Creating a SCIM admin account in Veza.
  • Check your email for "Welcome to Veza.com" and reset the password

  • Save this key securely using your organization's secrets management process; this key has administrative access to your Veza instance

  • The key cannot be retrieved after creation

  • Go to Administration > Sign-in Settings

  • Scroll down and check the box to Enable SCIM provisioning

    • Note: There is a 30-second delay before endpoints become available

  • Base URL: https://TENANT.vezacloud.com/scim/v2

  • Unique identifier field for users: userName

  • Supported provisioning actions:

    • Push New Users

    • Push Profile Updates

    • Push Groups

    • Deactivate Users

  • Authentication Mode: HTTP Header

  • Authorization: Your Veza API key from Step 2 "Create an API Key and enable SCIM provisioning"

  • Example SCIM configuration in Okta.

    Select the Push Groups tab

  • Add the groups you want to provision to Veza

  • To change the team scope, click Edit and add or remove providers, then save your changes.

  • Review the "Role Mapping" section to verify your group-to-role mappings

    For details on SSO role mapping, see Role Mapping for Single Sign-On.

  • To add permissions to teams:

    • Navigate to Administration > Team Management in Veza

    • For each team:

      1. Click on the team to view details

      2. To change roles for a user, click Change Roles in the Actions column

      3. To change the team scope, click Edit and add or remove providers, then save your changes

    See for more information on team management.

  • To assign Veza roles directly to individual users using the Roles attribute in Okta:

    1. In Okta Admin Console, navigate to your Veza application

    2. Under Provisioning > To App, click Edit

    3. In the Attribute Mappings section, add the following:

      • Okta Attribute: roles

      • Veza Attribute: roles

    4. Available roles:

      • admin

      • viewer

      • operator

    Note that direct role assignments can only be set for individual users (not groups).

    • Assign a test user to the Veza application and a pushed group

    • Wait 2-3 minutes for synchronization

    • Confirm the user appears in Veza under Administration > User Management

    • Verify the account's attributes match the Okta user.

  • Verify group provisioning:

    • Confirm Okta groups appear as Teams in Veza

    • Verify that team membership matches the group membership in Okta

    • Test that assigning roles to teams functions as expected

  • Test security boundaries:

    • Attempt to sign in with a deprovisioned user to verify access is properly removed

    • Verify that removing a user from one group but not another maintains appropriate permissions

    • Confirm that users cannot access Veza directly (bypassing SCIM/SAML) once integration is complete

  • The user should appear as deactivated

  • The user cannot log in

  • The user's API keys are disabled

  • Review Okta System Log for provisioning errors

  • Confirm group push is enabled in the application settings

  • In Okta, verify the group is added to the Push Groups tab for the Veza app

  • Push New Users

    Users assigned to the Veza application in Okta are automatically created in Veza

    Push Profile Updates

    Profile changes in Okta are automatically updated in Veza

    Push Groups

    Groups assigned to the Veza application in Okta are automatically created as Teams in Veza

    Deactivate Users

    Removing users from the Veza application in Okta automatically deactivates them in Veza

    Reactivate Users

    Reassigning previously deactivated users in Okta reactivates them in Veza

    User Management
    Group Push
    Teams
    Click "Configure" to view SSO groups
    Successful test.

    scim_provisioner

    Teams

    CreateGroup

    post

    Creates a new Veza group in the system

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Query parameters
    idstringOptional

    A unique request id used for tracing and debugging purposes.

    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Body
    anyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    post
    /scim/v2/Groups

    DeleteGroup

    delete

    Deletes a specific Veza group by id

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Path parameters
    idstringRequired

    A unique request id used for tracing and debugging purposes.

    Query parameters
    payloadanyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    delete
    /scim/v2/Groups/{id}

    GetGroups

    get

    Retrieves a list of Veza groups

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Query parameters
    idstringOptional

    A unique request id used for tracing and debugging purposes.

    payloadanyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    get
    /scim/v2/Groups

    GetSchemas

    get

    Returns the schema definitions supported by Veza including all attributes,

    their mutability, returned status, uniqueness, and type information.

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Query parameters
    idstringOptional

    A unique request id used for tracing and debugging purposes.

    payloadanyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    get
    /scim/v2/Schemas

    CreateUser

    post

    Creates a new Veza user in the system.

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Query parameters
    idstringOptional

    A unique request id used for tracing and debugging purposes.

    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Body
    anyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    post
    /scim/v2/Users

    GetResourceTypes

    get

    Returns the types of resources available in Veza's SCIM implementation (Users, Groups).

    Each resource type includes the endpoint, schema URI, and supported operations.

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Query parameters
    idstringOptional

    A unique request id used for tracing and debugging purposes.

    payloadanyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    get
    /scim/v2/ResourceTypes

    GetUsers

    get

    Retrieves a list of Veza users. Supports filtering, pagination and sorting.

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Query parameters
    idstringOptional

    A unique request id used for tracing and debugging purposes.

    payloadanyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    get
    /scim/v2/Users

    UpdateGroup

    patch

    Updates an existing Veza group's attributes using patch operations

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Path parameters
    idstringRequired

    A unique request id used for tracing and debugging purposes.

    Query parameters
    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Body
    anyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    patch
    /scim/v2/Groups/{id}

    UpdateUser

    patch

    Updates an existing Veza user's attributes using PATCH operations.

    Supports operations: add, replace, remove

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Path parameters
    idstringRequired

    A unique request id used for tracing and debugging purposes.

    Query parameters
    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Body
    anyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    patch
    /scim/v2/Users/{id}

    ReplaceUser

    put

    Replaces an existing Veza user with a new profile

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Path parameters
    idstringRequired

    A unique request id used for tracing and debugging purposes.

    Query parameters
    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Body
    anyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    put
    /scim/v2/Users/{id}

    GetServiceProviderConfig

    get

    Returns SCIM protocol features supported by Veza, including authentication

    schemes, patch support, bulk operations capability, and filtering features.

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Query parameters
    idstringOptional

    A unique request id used for tracing and debugging purposes.

    payloadanyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    get
    /scim/v2/ServiceProviderConfig

    DeleteUser

    delete

    Deletes a specific Veza user by id

    Authorizations
    AuthorizationstringRequired

    Bearer token authentication using a Veza Personal API key.

    Header Format: Authorization: Bearer <your-api-key>

    Creating an API Key:

    1. Log into your Veza tenant
    2. Navigate to Administration → API Keys
    3. Generate a new API key and save the value securely
    Path parameters
    idstringRequired

    A unique request id used for tracing and debugging purposes.

    Query parameters
    payloadanyOptional

    Represents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.

    start_indexinteger · int32Optional

    startIndex: 1-based index of the first result to return (default: 1)

    countinteger · int32Optional

    count: Maximum number of resources to return (default: server-determined)

    filterstringOptional

    filter: SCIM filter expression (e.g. "userName eq "[email protected]"")

    Responses
    200

    OK

    */*
    default

    Default error response

    application/json
    delete
    /scim/v2/Users/{id}

    No content

    No content

    No content

    No content

    No content

    No content

    No content

    No content

    No content

    No content

    No content

    No content

    POST /scim/v2/Groups HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Content-Type: application/json
    Accept: */*
    
    DELETE /scim/v2/Groups/{id} HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /scim/v2/Groups HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /scim/v2/Schemas HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    POST /scim/v2/Users HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Content-Type: application/json
    Accept: */*
    
    GET /scim/v2/ResourceTypes HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /scim/v2/Users HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    PATCH /scim/v2/Groups/{id} HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Content-Type: application/json
    Accept: */*
    
    PATCH /scim/v2/Users/{id} HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Content-Type: application/json
    Accept: */*
    
    PUT /scim/v2/Users/{id} HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Content-Type: application/json
    Accept: */*
    
    GET /scim/v2/ServiceProviderConfig HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    DELETE /scim/v2/Users/{id} HTTP/1.1
    Host: your-tenant.cookiecloud.ai
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*