website: fix typos (#20996)

This commit is contained in:
Dominic R
2026-03-20 12:43:34 -04:00
committed by GitHub
parent e3ddc0422a
commit 090d09fcdd
95 changed files with 279 additions and 280 deletions

View File

@@ -2,13 +2,13 @@
title: SCIM Source
---
The SCIM source allows other applications to directly create users and groups within authentik. SCIM provides predefined schema for users and groups, with a RESTful API, to enable automatic user provisioning and deprovisioning, SCIM is supported by applications such as Microsoft Entra ID, Google Workspace, and Okta.
The SCIM source allows other applications to directly create users and groups within authentik. SCIM provides a predefined schema for users and groups, along with a RESTful API, to enable automatic user provisioning and deprovisioning. SCIM is supported by applications such as Microsoft Entra ID, Google Workspace, and Okta.
The base SCIM URL is in the format of `https://authentik.company/source/scim/<source-slug>/v2`. Authentication is done via Bearer tokens that are generated by authentik. When an SCIM source is created, a service account is created and a matching token is provided.
## First steps
To set up an SCIM source, log in as an administrator into authentik. Navigate to **Directory->Federation & Social login**, and click on **Create**. Select the **SCIM Source** type, and give the source a name.
To set up an SCIM source, log in to authentik as an administrator. Navigate to **Directory->Federation & Social login**, and click on **Create**. Select the **SCIM Source** type, and give the source a name.
After the source is created, click on the name of the source in the list, and you will see the **SCIM Base URL** which is used by the SCIM client. Use the **Click to copy token** button to copy the token which is used by the client to authenticate SCIM requests.
@@ -22,7 +22,7 @@ Endpoint to list, create, update and delete users.
Endpoint to list, create, update and delete groups.
There is also the `/v2/ServiceProviderConfig` and `/v2/ResourceTypes`, which is used by SCIM-enabled applications to find out which features authentik supports.
There are also `/v2/ServiceProviderConfig` and `/v2/ResourceTypes`, which are used by SCIM-enabled applications to find out which features authentik supports.
## SCIM source property mappings
@@ -30,7 +30,7 @@ See the [overview](../../property-mappings/index.md) for information on how prop
### Expression data
Each top level SCIM attribute is available as a variable in the expression. For example given an SCIM request with the payload of
Each top-level SCIM attribute is available as a variable in the expression. For example, given a SCIM request with the payload of
<!-- prettier-ignore-start -->
```json
@@ -70,5 +70,5 @@ The following variables are available in the expression:
- `urn_scim_schemas_extension_enterprise_2_0` as a dictionary
:::info
Top-level keys which include symbols not allowed in python syntax are converted to `_`.
Top-level keys which include symbols not allowed in Python syntax are converted to `_`.
:::