SCIM (System for Cross-domain Identity Management) is an open standard that allows you to automate user lifecycle management across cloud-based applications and services. In this article, we will explain how to set up a SCIM integration with anny.
Who is this feature for?
This feature is primarily aimed at IT admins. It is especially useful for:
Automatically creating accounts for new employees before their very first login.
Immediately revoking booking permissions when someone leaves the company.
Centrally managing and synchronizing profile attributes (like departments or locations) directly from your IdP.
SCIM is ideal for organizations that want to completely eliminate manual account maintenance in anny and establish a "Single Source of Truth".
What changes when using SCIM?
For admins: You no longer need to manually create, update, or deactivate anny accounts. anny automatically mirrors the status of your IdP.
For users: Users won't notice the transition. Their login still works via SSO (SAML), but their profile in anny is always up to date.
Important: As soon as SCIM is active, user attributes (such as name, department, or role) are transmitted exclusively via SCIM. The existing Attribute Mapping via the regular SSO login (SAML) will be ignored by anny from this point forward, as SCIM acts as the sole data source.
Where to find this feature in anny
You can find the configuration under Account settings > SSO & Security.
Prerequisites:
You have admin access in anny.
You have admin access to your Identity Provider (e.g., Microsoft Entra).
The anny application already exists in your IdP for the SSO login.
Important: For security reasons, the SCIM token is only displayed to you once in anny. Copy it immediately and save it in your system right away.
How the logic works
Your Identity Provider monitors changes to the assigned users (e.g., new department, account suspension).
If a change occurs, the IdP sends this information to anny's SCIM interface via an invisible channel (backchannel).
anny validates the request using the secret token.
The profile in anny is updated instantly – completely regardless of whether the person is currently logged in.
Thanks to this continuous background process, both systems always share the exact same data state.
Setting up SCIM with a generic IdP (e.g., Okta, Google)
The principle is identical for almost all providers, even if the menus are named differently.
In anny, go to SSO & Security > SCIM and copy the URL and token.
Open the provisioning menu in your IdP application (often called "API Integration" or "App Provisioning").
Paste the Tenant URL as the "Base URL" and the token as the "API Token" (or Bearer Token).
Test the connection and start the sync cycle.
Even external or less common systems now communicate seamlessly with the anny user database.
Setting up SCIM in Microsoft Entra
With this guide, you will set up SCIM so that Microsoft Entra automatically provisions your users for anny.
In anny, open the Account settings > SSO & Security and select SCIM.
Copy the Tenant URL and the Token.
In Microsoft Entra, open the existing anny application for which you want to set up provisioning.
Go to the Provisioning section and start a new configuration there (or select the existing one).
Enter the copied Tenant URL into the corresponding field and paste the token into the Secret Token field.
Click on Test Connection to check if Entra can reach the anny SCIM interface.
Save the configuration as soon as the test is successful.
Finally, activate the provisioning via the Start provisioning button.
Result: Microsoft Entra is now provisioning users via SCIM.
Note: The provisioning takes some time. Please allow for some waiting time before checking the result in anny.
