Setting Up SCIM Provisioning for Span via WorkOS
Last updated: April 8, 2026
Overview
Span’s SCIM integration enables automatic user provisioning and deprovisioning via your identity provider (Okta, Azure AD, Google Workspace, etc.) using WorkOS.
When users are added to a designated group in your identity provider, access to Span accounts are provisioned. When users are removed, their access is automatically revoked.
NOTE: SCIM does not create new users. The users must exist in Span first. SCIM just controls account access.
This guide covers SCIM access provisioning only. HRIS sync and team/directory sync are configured separately.
What SCIM Does (and Doesn’t Do)
SCIM handles:
Granting baseline access automatically
Deactivating Span access when users are removed
SCIM does not handle:
Creating new Span user accounts
Employee profile data (title, department, manager)
Team structure or hierarchy
Permission assignment from the IdP side
Those are handled inside Span via HRIS sync and permission rules.
Prerequisites
Before starting, you’ll need:
An active Span organization
An identity provider that supports SCIM (Okta, Azure AD, Google Workspace)
A WorkOS organization connected to Span
Admin access in your identity provider
Setup Steps
1. Get SCIM Credentials from Span
WorkOS will provide you with the following:
SCIM Base URL
Bearer Token (secret — must be shared securely)
Unique Identifier Field (email)
These are required to configure provisioning in your identity provider.
🔐 Security note: The bearer token should always be shared via a secure method (e.g., 1Password, secure vault), not Slack or email.
2. Configure SCIM in Your Identity Provider (Okta Example)
A. Open the Span Application
Go to Applications → Span
Click Edit
Under Provisioning, set:
Provisioning Type →
SCIM
Save
This will reveal the Provisioning tab.
B. Configure SCIM Connection Settings
In Provisioning → Integration:
SCIM Connector Base URL
→ Paste the Base URL provided by Span
Authentication Mode
→
HTTP HeaderAuthorization
→
Bearer <token>(Paste the bearer token provided by Span)
Unique Identifier
→
email
Save your changes.
C. Enable Supported Actions
In Provisioning → To App, enable:
✅ Create Users
✅ Update User Attributes
✅ Deactivate Users
Deactivation covers user removal / offboarding.
Group push is not required for Span SCIM.
3. Assign Users to the Span App
Users must be assigned to the Span app in your identity provider.
You can do this by:
Assigning individuals directly, or
Assigning a group (recommended)
Once assigned:
Users will be provisioned into Span automatically
Removing assignment will deprovision access
4. Enable SCIM on the Span Side
After IdP configuration is complete:
Contact your Span admin or support team
Span will run a one-time enablement step to activate SCIM for your organization
Once enabled, provisioning and deprovisioning are fully automated.
5. Test Provisioning
Recommended test flow:
Assign a user to the Span app (i.e. a real person who already exists in Span)
Confirm:
User appears in Span
User can log in
Remove the user assignment
Confirm:
Span access is revoked
Sync Timing
SCIM changes are processed automatically
Most updates propagate within minutes (provider-dependent)
Permissions in Span
Baseline Permissions
Permissions groups are managed manually today, they are not managed by SCIM.
Advanced Permissions (Recommended)
Additional permissions (Admin, Team Lead, Finance, etc.) are managed inside Span, not from the identity provider.
You can configure permission rules such as:
Department = Finance → Finance group
Title contains “Manager” → Team Lead group
Leadership roles → Admin group
These rules update automatically as employee data changes.
Common Gotchas
Email is the unique identifier
If a user’s email changes, Span will treat it as a new user.
SCIM does not sync teams or hierarchy
Permissions cannot be controlled from Okta groups
HRIS sync is separate from SCIM provisioning
Need Help?
If you need:
SCIM credentials
Enablement confirmation
Help testing provisioning
Guidance on permission rules
Contact your Span team and we’ll walk through it with you live.