Setup Process
Setup Process
- Contact Support – We will enable SCIM for your site.
- Generate Token – A SCIM bearer token will be generated for your site. We store only the encrypted token in our system.
- Configure in IdP – Enter the SCIM base URL
https://rcm-api.athelas.com/v1/scribe/scim/v2/and bearer token (provided by your Commure point of contact) in your IdP’s SCIM configuration page. - Assign Users/Groups – Provisioning can be done by assigning users directly or by assigning the app to a group.
SCIM Endpoints
SCIM Endpoints
We implement the standard SCIM endpoints:UsersGroups
Attributes We Support
Attributes We Support
When configuring SCIM in your IdP, use the following mappings (not all are required):
| SCIM Attribute Path | Required | Example Value | Notes |
|---|---|---|---|
userName | Yes | [email protected] | Used as the login/username (must be unique) |
name.givenName | Yes | Jane | First name |
name.familyName | Yes | Doe | Last name |
emails[type eq "work"].value | Yes | [email protected] | Primary email address |
active | Yes | true | Deactivation in IdP disables the user here |
urn:ietf:params:scim:schemas:extension:custom:2.0:User:role | No | ADMIN or PROVIDER | Defaults to PROVIDER if not provided |
urn:ietf:params:scim:schemas:extension:custom:2.0:User:npi | No | 1234567890 | Defaults to 0 if empty |
urn:ietf:params:scim:schemas:extension:custom:2.0:User:facility | No | Main Clinic | Facility name |
Supported Operations
- User provisioning – Add, update, deactivate users.
- PATCH operations – Supports
replaceoperations on attributes. - Group membership updates – Manage group assignments through the
groupspath. - Custom attributes – Additional attributes supported:
npifacilityrole(eitherADMINorPROVIDER, defaults toPROVIDER)
Note: Ifnpiis passed as an empty value, it defaults to0.
Groups Support
- We support group-based user assignment.
- We do not support dynamic group pushes.
- Group membership updates via PATCH are supported.
Security
- All communication with SCIM endpoints must be authenticated using the SCIM bearer token.
- Tokens are unique per site and stored only in encrypted form.
Next Steps
- In your IdP, configure SCIM with the Base URL:
https://rcm-api.athelas.com/v1/scribe/scim/v2/and Bearer Token we provide. - Assign users or groups to the application to automatically provision accounts.
- Deactivating a user in your IdP will deactivate them in our system.
Troubleshooting
- Microsoft Entra ID (Azure AD): Uses
PATCHheavily for updates. Ensure PATCH is enabled in your configuration. - Okta: Supports both direct user assignment and group-based assignment.
- Ensure that the required field
emailsis provided for each provisioned user and/or any optional fields you wish to configure.

