Three lines

Uber

Developers

Onboarding to SCIM Provisioning

Introduction

SCIM, or System for Cross-domain Identity Management, is a standard for automating the exchange of user identity information between identity domains, or IT systems

Uber supports SCIM 2.0, that is published as IETF RFC 7643 and RFC 7644

SCIM provisioning has multiple benefits, including below (but not limited to):

  • Standardization of provisioning
  • Centralization of identity
  • Automation of employee onboarding and offboarding
  • Push based model, that is low maintenance, resilient and hassle-free for the admins

Pre Checklist

Before you start the setup, below are the requirements to enable SCIM provisioning end to end

  • You must be onboarded to a Uber for Business organization and have admin access to it at business.uber.com
  • You must allow syncing via identity providers, you can find this by hovering your mouse above your profile photo in the top right corner - Settings - Integrations section - toggle Allow
  • We have pre-built SCIM apps for few Identity Providers as listed below. If you need a SCIM app for a different Identity Provider, reach out to your account manager. You can refer to our SCIM APIs documentation to have a custom integration.

Functioning

As of today, our SCIM APIs automate provisioning/de-provisioning in below manner

Provisioning: When an employee joins your company, SCIM provisioning flow will create an employee record in your Uber for Business organization and automate an email invitation asking them to link their Uber account to your Uber for Business organization.

De-provisioning: When an employee leaves your company, SCIM will unlink their Uber account from your Uber for Business organization.

Setup

Before you configure SCIM provisioning on your Identity Provider side, you need to onboard your Uber for Business organization to enable SCIM provisioning. In total, you need to do all below to successfully integrate with SCIM provisioning

  1. Configure SCIM app on your Identity Provider
  2. Test the Integration
Step 1: Configure SCIM app on your Identity Provider

Use the organization ID from Uber for Business portal in this SCIM app

Note: Uber currently doesn’t support service accounts for SCIM provisioning. So you are recommended to create a separate account to do the same as detailed below.

You are recommended to create a separate admin account on Uber and link it to this organization. This ensures that SCIM provisioning keeps functioning independent of various admins leaving/joining your organization. To clarify, this involves the following steps

  1. Create a new Uber account
  2. Invite this user to your Uber for Business organization as an admin
  3. While configuring SCIM in your Identity Provider portal, use this newly created account while authenticating to obtain an auth token
  4. Now you can add more app managers to manage the SCIM app so that they can make any incremental changes in future
Identity Provider Guide
OneLogin Follow the guide at here
Okta Follow the guide at here
Others Please reach out to your account manager who can get our SCIM app made available for your Identity Provider. Alternatively, you can create a custom SCIM app by following these instructions
Step 2: Test the Integration

We recommend you to enable SCIM app for a small group and test provisioning/de-provisioning flows. You should have below flows tested

  • Someone joins this group on your organization side, within few minutes/hours (depending on SLAs provided by your Identity Provider), you should start seeing this user on Uber for Business portal under People tab.
  • Someone leaves your group, this user should disappear on Uber for Business portal (unless this user was the last Uber for Business admin of your organization).
  • FirstName/LastName/UserEmail is updated on your organization side, the newly updated information should start appearing on Uber for Business portal.

Uber

Developers
© 2023 Uber Technologies Inc.