Set Up SCIM Integration in SailPoint IdentityNow¶
Alation Cloud Service Applies to Alation Cloud Service instances of Alation
Available from release 2026.2.1.0
You can configure SailPoint IdentityNow (SaaS) to provision users and groups to Alation using SCIM 2.0. This integration enables automated user lifecycle management, including user provisioning, group membership updates, user suspension, and deprovisioning.
This guide explains how to configure the SCIM 2.0 connector in IdentityNow to integrate with Alation’s SCIM API after enabling SCIM on your Alation Cloud Service instance.
Note
SailPoint offers two identity governance products:
IdentityNow: SaaS, SailPoint-hosted cloud
IdentityIQ: On-premises, customer-managed deployment
This guide covers IdentityNow (SaaS) integration. The configuration uses Sources (not Applications as in IdentityIQ). For the on-premises variant, see Set Up SCIM Integration in SailPoint IdentityIQ.
Important
The SailPoint IdentityNow configuration steps in this guide are based on the current SailPoint setup at the time of writing. SailPoint may update their UI, navigation paths, or feature names in future releases. If you notice discrepancies, refer to the latest SailPoint IdentityNow documentation for current instructions.
Prerequisites¶
Before configuring the integration, ensure the following:
You have an Alation Cloud Service instance with SCIM enabled. See Enable SCIM Integration for User and Group Management.
You have SCIM authentication credentials configured in Alation. You can use either:
API Token authentication: Generate a SCIM bearer token in Alation. See Configure SCIM Integration.
Basic authentication: Set up a username and password using the Alation Django shell. See Configure SCIM Integration for details.
Open a Support case with Alation to assist with server-side configuration. In the initial request, ask Support to set the SCIM client to
sailpointon your Alation Cloud Service instance. Depending on your configuration choices, you may need to add additional requests to the same ticket later.You have a SailPoint IdentityNow tenant with the SCIM 2.0 SaaS connector available.
You have admin access to IdentityNow with privileges to do the following configuration.
You have an Active Directory source (for example, Entra ID) configured in IdentityNow as the identity source.
Network connectivity is established between IdentityNow and the Alation Cloud Service instance over HTTPS.
Configuration Steps¶
Follow these steps to configure the integration:
Step 1: Create the Source in IdentityNow¶
In IdentityNow, navigate to Admin > Connections > Sources.
Click Create New and select SCIM 2.0 SaaS as the source type.
Provide a descriptive name for the source (for example, Alation SCIM Integration).
On the Configuration tab, enter the following settings:
Setting
Value
Base URL
https://<your-instance>.alationcloud.com/scim/v2Authentication Type
API Token or Basic Authentication
Token
Paste the SCIM bearer token from Alation (if using API Token authentication)
Username
Enter the username configured in Django shell (if using Basic Authentication)
Password
Enter the password configured in Django shell (if using Basic Authentication)
Enable Non-Compliant Server
Enabled (select the checkbox)
Click Test Connection to verify the configuration. You should see a success message.
Step 2: Configure Account Management¶
Configure the account schema and create accounts for user provisioning.
Navigate to Account Management > Account Schema > Discover Schema to allow IdentityNow to detect the SCIM schema from Alation.
Click Create New Account and configure the following:
Setting
Value
userName
Identity Attribute
Attribute
Work Email
Save the account configuration.
Step 3: Aggregate Entitlements¶
Run an initial entitlement aggregation to import Alation’s SCIM groups into IdentityNow.
On the source page, navigate to Entitlement Management > Entitlement Aggregation.
Select Specific Types and choose Group.
Click Start Aggregation.
IdentityNow imports the existing SCIM groups from Alation as entitlements. You can use these entitlements in access profiles and access requests.
Step 4: Create an OAuth Client in IdentityNow¶
Create an OAuth client to authenticate API calls from the workflow to IdentityNow’s entitlements API.
Navigate to Admin > Global > Security Settings > API Management.
Click New Client and configure the following:
Setting
Value
Grant Type
Client Credentials
Scopes
idn:entitlement:readidn:sources-admin:readidn:sources-admin:manageidn:sources:readsp:scopes:defaultCopy the Client ID and Client Secret immediately. You need these values in the workflow configuration.
Verify the OAuth client by requesting a token:
curl -s -X POST \ 'https://<your-identitynow-tenant>.api.identitynow.com/oauth/token' \ -H 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'grant_type=client_credentials' \ --data-urlencode 'client_id=<CLIENT_ID>' \ --data-urlencode 'client_secret=<CLIENT_SECRET>'
A successful response returns a JWT bearer token.
Step 5: Configure the Workflow for Group Sync¶
SailPoint IdentityNow does not natively support group creation and management for this integration. A custom workflow is used to handle these tasks.
Create a workflow in IdentityNow to automatically sync groups from your Active Directory source (for example, Entra ID) to Alation as SCIM groups. The workflow runs each time your Active Directory source completes an account aggregation, if scheduled.
Note
Before configuring the workflow, identify the source ID of your Active Directory source. Run the following command to find it:
curl -s "https://<your-identitynow-tenant>.api.identitynow.com/v3/sources?filters=name%20eq%20%22Active%20Directory%22" \
-H "Authorization: Bearer <JWT_TOKEN>" \
-H "Accept: application/json"
The response includes an id field. Note this value for use in the workflow trigger filter.
Navigate to Admin > Workflow and create a new workflow with the following components:
Configure the Trigger¶
Set the workflow to run automatically when your Active Directory source aggregation completes.
Field |
Value |
|---|---|
Trigger Type |
Account Aggregation Completed |
Filter |
|
Replace <AD_SOURCE_ID> with the source ID of your Active Directory source.
Add Action: Get Entitlements from Active Directory¶
Add an HTTP Request action to fetch group entitlements from the Active Directory source.
Field |
Value |
|---|---|
Method |
GET |
Request URL |
|
Request URL Parameters |
|
Request Headers |
|
Authentication Type |
OAuth 2.0 Client Credentials |
Token URL |
|
Client ID |
From the OAuth client created in Step 4 |
Client Secret |
From the OAuth client created in Step 4 |
This configuration retrieves up to 250 group entitlements starting at offset 0. If your Active Directory source has more than 250 group entitlements, configure pagination in your workflow by incrementing the offset parameter and repeating the request until a page returns no results.
Add Operator: Loop¶
Add a Loop operator to iterate through each group returned in the response.
Field |
Value |
|---|---|
Loop Input |
|
Use the variable selector to pick the path: Steps > Get entitlements from Entra > body.
Inside the Loop block, add the following actions:
Add Action: Check Group¶
Add an HTTP Request action inside the Loop to check if the group already exists in Alation.
Field |
Value |
|---|---|
Method |
GET |
Request URL |
|
Authentication Type |
Custom Authorization |
Header Name |
|
Header Value |
|
Request Headers |
|
Request Content Type |
None |
Request URL Parameters |
|
Add Operator: Is New Group?¶
Add a Choice operator to determine whether to create the group or skip it.
Field |
Value |
|---|---|
Operator Type |
Choice |
Input Variable A |
|
Input Variable B |
|
Comparator |
NumericEquals |
If True (A == B) |
Go to Create Group |
If False (A != B) |
Go to Send Email |
Add Action: Create Group¶
Add an HTTP Request action to create the SCIM group in Alation.
Field |
Value |
|---|---|
Method |
POST |
Request URL |
|
Authentication Type |
Custom Authorization |
Header Name |
|
Header Value |
|
Request Headers |
|
Request Content Type |
SCIM JSON |
Request Body |
{
"displayName.$": "$.loop.loopInput.name",
"schemas": [
"urn:ietf:params:scim:schemas:core:2.0:Group"
]
}
|
Add Action: Send Email¶
Add a Send Email action to notify when a group already exists.
Field |
Value |
|---|---|
Recipient Email List |
Enter the email address to notify |
Subject |
|
Body |
|
Add an End Step after the Loop to complete the workflow.
Note
The SCIM bearer token expiration is configurable (typically 1–6 months). Check the configured expiration in the Alation UI (Admin Settings > Authentication > SCIM Token) and regenerate the token before it expires, either from the UI or through the Alation Django shell.
If you use basic authentication instead of a bearer token, set the Authentication Type to Basic Authentication and enter the SCIM username and password in the Check Group and Create Group actions.
Step 6: Create Access Profiles¶
Create access profiles to bundle SCIM group entitlements for user provisioning.
Once groups are populated in Alation, they can be incorporated into SailPoint access profiles. These access profiles are then assigned to applications, where access requests can be enabled. When an administrator approves an access request for a user, SailPoint communicates with the Alation user API to automatically add the user to the corresponding group, completing the lifecycle management process.
Navigate to Admin > Access Model > Access Profiles.
Click Create New > Access Profile and provide a name (for example, Alation – Server Admin).
Select your Alation SCIM source as the source.
Under Entitlements, select the SCIM groups to include in the access profile.
For example:
Access Profile
Entitlements (Alation SCIM Groups)
Alation – Admin
ServerAdmin,CatalogAdminAlation – Analyst
DataAnalystAlation – Steward
DataStewardEnable the access profile to make it available for access requests.
Save the access profile.
Repeat for each access profile you need.
Step 7: Test the Configuration¶
Verify the end-to-end integration by testing group sync and user provisioning.
Run an account aggregation on the Active Directory source (for example, Entra ID) to start the workflow.
Verify that the workflow runs successfully in Admin > Workflow > Executions to check the execution history.
Confirm that the groups appear in Alation under Admin Settings > Groups.
Aggregate entitlements on the Alation SCIM source to import the newly created groups as IdentityNow entitlements.
Provision a test user by requesting an access profile (see User Provisioning).
Verify that the test user appears in Alation with the correct group membership.
User and Group Operations¶
After completing the configuration, you can perform the following operations.
Group Provisioning¶
Run an account aggregation on the Active Directory source. The workflow automatically creates new groups in Alation as SCIM groups.
Run an entitlement aggregation on the Alation SCIM source to import the groups as entitlements in IdentityNow.
User Provisioning¶
In IdentityNow, navigate to Request Center.
Search for the user who needs access to Alation.
Select the appropriate access profile (for example, Alation – Analyst).
Submit the request.
If approval is configured, the request routes to the approver. Once approved, IdentityNow provisions the user in Alation via SCIM.
The user is provisioned in Alation with the roles determined by the SCIM groups in the access profile.
Update Group Membership¶
Navigate to Request Center.
Search for the user who needs additional group membership.
Select the additional access profile or entitlement (SCIM group).
Submit the request.
Once approved, the user is added to the SCIM group in Alation.
User Suspension¶
User suspension in IdentityNow removes the user’s SCIM account from Alation, which suspends the user and removes them from all SCIM groups.
Suspend a User¶
In IdentityNow, navigate to Admin > Identities > Identity List.
Search for and select the user.
Under Accounts, locate the Alation SCIM account.
Select the Alation source account and choose to disable or remove it.
Confirm the action.
Alternatively, change the user’s lifecycle state to an inactive state (for example, inactive or terminated) to automatically disable accounts on connected sources.
Result
The SCIM account is deprovisioned from Alation.
The user appears under Suspended Users in Alation.
The user is removed from all SCIM groups.
Reactivate a Suspended User¶
Change the user’s lifecycle state back to an active state, or submit a new access request through the Request Center.
Select the appropriate access profile for the Alation SCIM source.
Submit the request.
Result
The SCIM account is re-created in Alation.
The user is reactivated.
The user is automatically re-added to SCIM groups based on the entitlements in the assigned access profile.
User Deprovisioning¶
To remove a user from a specific SCIM group without suspending the user, use one of the following methods:
Using Request Center¶
Navigate to Request Center.
Select Request for Others and search for the user.
Select the application (Alation).
Select the access profile mapped to the SCIM group.
Choose Remove Access.
Submit the request. If approval is configured, the request routes to the approver.
Once approved, the entitlement is revoked and the user is removed from the SCIM group in Alation.
Using the Identity Detail View¶
Navigate to Admin > Identities.
Search for and select the user.
Go to the Access tab.
Locate the access profile or entitlement (SCIM group) to remove.
Remove the access profile or entitlement.
The user is removed from the SCIM group in Alation.
Maintenance Tasks¶
Run the following tasks on a recurring schedule to keep user and group data synchronized:
Task |
Purpose |
|---|---|
Account Aggregation (Active Directory) |
Runs on the Active Directory source to start the group sync workflow to Alation |
Entitlement Aggregation (Alation SCIM) |
Runs on the Alation SCIM source to import SCIM groups as IdentityNow entitlements |
Workflow Execution Monitoring |
Review workflow execution history for errors or failed group creation attempts |
Troubleshooting¶
For error messages and troubleshooting tips, see Troubleshooting SCIM Configuration.
For testing the SCIM configuration, see Testing SCIM Configuration.