Skip to main content

How can I automate user management with SCIM?

SCIM (System for Cross-domain Identity Management) is available for Enterprise customers using WorkOS-based SSO. It automates user provisioning and deprovisioning, helping IT teams securely and efficiently manage access to Synthesia at scale.

Meg avatar
Written by Meg
Updated today

This feature is in Beta.

This feature is exclusively available to Enterprise customers on Organization plans.

If you would like discuss upgrading your plan, contact the Synthesia Support team or see the How do I upgrade my Synthesia plan? guide.

With SCIM, IT admins can:

  • Automatically create and remove user accounts

  • Sync role, license, and profile changes from your identity provider (e.g., Okta or Microsoft Entra ID)

  • Eliminate manual account updates and reduce the risk of orphaned or outdated user access

⚠️ SCIM is only supported when SSO is configured via WorkOS. If your organization uses SSO through AWS Cognito, you’ll need to migrate to WorkOS before enabling SCIM.


How to set up SCIM for your organization:

  1. Contact Synthesia Support to enable WorkOS for your organization.

  2. Set up SSO with WorkOS

    • Support will invite your Org Admin to complete the SSO setup.

    • The Admin configures SAML in your identity provider (e.g., Okta or Entra ID).

    • Test and confirm that SSO is working.

  3. Set up SCIM and sync your directory

    • In your identity provider, enable SCIM using WorkOS setup instructions.

    • Start syncing users, roles, and attributes to your Synthesia workspace.

  4. Manage users from your identity provider
    Once SCIM is active, all user management (adding, removing, updating) happens in your identity system — changes are reflected automatically in Synthesia.


💬 FAQs

What’s the user experience like?

No change! Users can log in via SSO. There’s no need for them to set anything up or manage their own accounts.

Is SSO required before setting up SCIM?

Yes. SCIM only works when SSO is set up using WorkOS. If you’re using AWS Cognito for SSO today, you’ll need to migrate first.

What’s the difference between SCIM, SSO, and SAML?

  • SCIM: Automates account provisioning and deprovisioning

  • SSO (Single Sign-On): Lets users log in once to access multiple apps

  • SAML (Security Assertion Markup Language): A protocol used to enable SSO

    SCIM and SAML are standard open protocols used by identity providers like Okta and Microsoft Entra ID.

What does SCIM allow me to manage?

SCIM can:

  • Provision and deprovision users in real time

  • Update attributes like:

    • Department

    • Cost center

    • License type

    • Role

    • Profile picture

Did this answer your question?