Configuring SCIM (System for Cross-domain Identity Management) user provisioning for Zoom allows you to automate user account creation, modification, and deactivation using an identity provider (IdP) like Okta or Azure AD. The general process involves enabling SCIM in Zoom, configuring your IdP to connect to Zoom’s SCIM endpoint, and then mapping user attributes between your IdP and Zoom. This streamlined approach centralizes user management and ensures consistent user information across systems.
Prerequisites
- A Zoom Business or Education account.
- Zoom owner or admin privileges.
- A supported Identity Provider (IdP) that supports SCIM 2.0 (e.g., Okta, Azure AD, OneLogin).
- An understanding of your IdP’s user provisioning features.
- A plan for how you will map user attributes between your IdP and Zoom (e.g., first name, last name, email, department). Consider the SCIM attributes for provisioning phone users if you intend to provision phone users.
Enable SCIM Provisioning in Zoom
- Sign in to the Zoom web portal as an administrator.
- In the navigation menu, click Advanced, then App Marketplace.
- Search for your Identity Provider (e.g., Okta, Azure AD) in the Marketplace. If a pre-built Zoom app for your IdP exists, it is recommended to install it. Otherwise, continue with the generic SCIM setup.
- If installing a pre-built app, follow the instructions provided by Zoom and your IdP for configuring the integration. If not, continue with these steps.
- In the Zoom web portal, navigate to User Management then Users.
- Click the Provisioning tab (this tab might not appear until SCIM is enabled at the account level via the Marketplace). If you do not see a Provisioning tab, you might need to manually create a SCIM app in your IdP. See your IdP documentation for how to configure a SCIM integration manually.
- Find the section related to SCIM. This section will vary depending on your IdP integration method.
- Typically, you will be prompted to generate a Secret Token or Bearer Token. This token is crucial for authenticating your IdP with Zoom. Generate this token and store it securely. You will only see it once.
- Also locate the SCIM base URL. This URL is needed in the next section. It is usually in the format
https://api.zoom.us/scim2. - Keep this page open, as you will need the Secret Token and SCIM base URL in the next section.
Configure SCIM in your Identity Provider (IdP)
The following steps are generalized and will vary significantly based on the specific IdP you are using (Okta, Azure AD, etc.). Consult your IdP’s documentation for precise instructions.
-
Sign in to your Identity Provider’s admin portal.
-
Create a new application or integration. Search for a pre-built “Zoom” app in your IdP’s app catalog. Using the pre-built app is the recommended approach if available.
-
If no pre-built app is available, create a new application using the SCIM 2.0 protocol (or equivalent).
-
Configure the SCIM base URL or Tenant URL. This is the SCIM base URL you obtained from the Zoom web portal in the previous section.
-
Enter the Secret Token or Bearer Token in the appropriate field. This is the Secret Token you obtained from the Zoom web portal in the previous section.
-
Enable SCIM provisioning for the application.
-
Configure the supported SCIM operations (Create, Read, Update, Delete). Ensure all operations are enabled for full SCIM functionality.
-
Configure user attribute mappings. This is a critical step. Map the attributes in your IdP to the corresponding attributes in Zoom. At a minimum, you should map:
userName(IdP) touserName(Zoom) (typically email address)name.givenName(IdP) togivenName(Zoom) (First Name)name.familyName(IdP) tofamilyName(Zoom) (Last Name)active(IdP) toactive(Zoom) (User Status - enables/disables user)
You may also map other attributes such as:
department(IdP) todepartment(Zoom)title(IdP) totitle(Zoom)- For Zoom Phone provisioning, refer to the SCIM attributes for provisioning phone users documentation.
-
Test the connection between your IdP and Zoom. Most IdPs provide a “Test Connection” button to verify that the SCIM configuration is correct.
-
Assign users or groups to the Zoom application in your IdP. This will trigger the provisioning process.
Verify User Provisioning
- In your IdP, assign a test user to the Zoom application.
- In the Zoom web portal, navigate to User Management then Users.
- Verify that the test user has been created in Zoom with the correct attributes. It might take a few minutes for the user to appear.
- Update the test user’s attributes in your IdP (e.g., change their department).
- Verify that the changes are reflected in the Zoom web portal.
- Deactivate the test user in your IdP.
- Verify that the user is deactivated in the Zoom web portal.
Common Issues
- Invalid Credentials: Double-check the Secret Token and SCIM base URL. Ensure that the token has not expired or been revoked. Regenerate a new token in the Zoom portal, and update your IdP.
- Attribute Mapping Errors: Ensure that the attribute mappings are correct and that the data types are compatible between your IdP and Zoom. Review your IdP logs for specific error messages related to attribute mapping.
- SCIM Not Enabled: Verify that SCIM provisioning is enabled in both your IdP and Zoom account. Some features require explicit activation.
- Rate Limiting: SCIM requests can be subject to rate limits. If you are provisioning a large number of users, consider implementing batch processing or throttling to avoid exceeding the limits. Consult the Zoom API documentation for details on rate limits.
- User Already Exists: If a user already exists in Zoom with the same email address, provisioning might fail. Ensure that user accounts are unique and that there are no conflicting accounts. Consider using the
userNameattribute as the unique identifier for users.