Documentation Index
Fetch the complete documentation index at: https://docs.rootly.com/llms.txt
Use this file to discover all available pages before exploring further.

Introduction
SCIM (System for Cross-domain Identity Management) lets your identity provider automatically manage Rootly users and groups. When users are assigned or unassigned in your IdP, they are provisioned or deprovisioned in Rootly without any manual steps.Before You Begin
Before connecting your IdP:- Complete SSO setup for your organization
- Navigate to Integrations > SSO in Rootly and copy your SCIM Token — this is the Bearer token your IdP uses to authenticate SCIM requests
- Note your SCIM tenant URL:
https://rootly.com/scim
| Resource | Supported Operations |
|---|---|
| Users | Create, read, update (PUT/PATCH), deactivate, delete |
| Groups | Create, read, update (PUT/PATCH), delete, member sync |
Identity Provider Setup
Expand the section for your identity provider:Okta
Okta
Enable SCIM provisioning

Enable Create and Deactivate users
- Create Users — provisions users when assigned to the Rootly app
- Deactivate Users — removes users from Rootly when unassigned
Push groups (optional)
- In Okta, navigate to Directory > Groups and create or select a group
- Go to Applications > Rootly > Push Groups tab
- Click +Push Groups, select the group, switch from Create Group to Link Group, and click Save
- In Rootly, go to Integrations > SSO > Role Assignment and map the Okta Group to a Rootly Role
Microsoft Entra
Microsoft Entra
Google Workspace
Google Workspace
Add a new Web and Mobile app

Configure auto-provisioning
https://dummy.com/saml for all values. When you reach the auto-provisioning step:- SCIM Token: your token from Rootly > Integrations > SSO
- Endpoint URL:
https://rootly.com/scim - Select a group of users to import, or leave empty to import all
Keycloak
Keycloak
Install the SCIM extension
keycloak-scim JAR from the releases page, place it in /opt/keycloak/providers/, and restart Keycloak.Add SCIM as an event listener
scim to the list. Save.Create a SCIM federation provider
| Field | Value |
|---|---|
| UI display name | Rootly |
| SCIM 2.0 endpoint | https://rootly.com/scim |
| Endpoint content type | application/scim+json |
| Auth mode | BEARER |
| Auth password/token | Your SCIM Token from Rootly |
SCIM_EMAIL_AS_USERNAME=true — this ensures usernames are sent in email format, required for user matching in Rootly.Enable propagation
- Enable user propagation: On
- Enable group propagation: On (optional)
- Log SCIM requests and responses: On (recommended for debugging)
- Import action:
CREATE_LOCAL
Rippling
Rippling
Supported Attributes
Users
| SCIM Attribute | Rootly Field | Notes |
|---|---|---|
userName | Required. Must be a valid email address. | |
name.givenName | First name | |
name.familyName | Last name | |
displayName | Preferred name | |
externalId | External ID | Stored per SSO account, not globally |
active | Membership status | false removes the user’s team membership |
emails | Primary work email | |
phoneNumbers | Phone numbers | Auto-verified on import; normalized with US as default country code |
Groups
| SCIM Attribute | Rootly Field | Notes |
|---|---|---|
displayName | Group name | |
externalId | External identifier | |
members | Group members | User and nested group types both accepted |
Group Sync
SCIM groups pushed from your IdP can be synced to Rootly Groups. When enabled:- Create — a pushed SCIM group creates a corresponding Rootly Group, or links to an existing one with the same name
- Rename — renaming a group in your IdP renames the linked Rootly Group
- Members — adding or removing members from a SCIM group updates Rootly Group membership
Role Assignment via Groups
When Assign roles to SCIM groups is enabled, Rootly automatically assigns roles based on group membership. If a user belongs to multiple SCIM groups with different role configurations, the highest-weighted role is applied.SCIM Logs
All SCIM operations are logged. Go to Integrations > SSO > SCIM Logs to view a history of provisioning requests including resource type, event type, request URL, response status, and full request/response bodies (encrypted at rest). Use this to diagnose provisioning failures or verify that operations from your IdP are reaching Rootly.Troubleshooting
The SCIM endpoint is not resolving
The SCIM endpoint is not resolving
https://rootly.com/scim with no trailing slash.Authentication errors from the IdP
Authentication errors from the IdP
Users are not being provisioned
Users are not being provisioned
userName attribute is a valid email address, Create Users is enabled in your IdP’s provisioning settings, and the default username format is set to email. Check SCIM Logs for failed requests and their error details.Deactivated users still appear in Rootly
Deactivated users still appear in Rootly
active: false), Rootly removes their team membership but preserves the user record. If they still appear active, check SCIM Logs for a failed deactivation request.Groups are not syncing to Rootly
Groups are not syncing to Rootly
Phone numbers are not syncing
Phone numbers are not syncing
