System for Cross-domain Identity Management (SCIM) has transformed how enterprises manage user provisioning in cloud applications. For Atlassian administrators, SCIM provides a way to automatically sync users and groups from your Identity Provider (IdP) to your Atlassian products.
But if you've implemented SCIM with Atlassian, you've likely discovered that it's not a complete solution. In this post, we'll explore the limitations of SCIM sync in Atlassian environments and how you can overcome them with the Admin Automation app.
Before diving into the limitations, let's acknowledge what SCIM does well:
Automated user provisioning from your IdP (like Okta, Azure AD, or OneLogin)
Basic group membership synchronization
Attribute updates when user details change
Deprovisioning when users are removed from your directory
In theory, this should solve all your user management needs. In practice, however, Atlassian administrators quickly encounter significant gaps.
Perhaps the most frustrating limitation: SCIM cannot directly add users to or remove users from "protected" groups in Atlassian, including:
site-admins
org-admins
User admin groups like jira-user-access-admins and confluence-user-access-admins
Product admin groups like jira-admins and confluence-admins
This creates a major governance challenge, as your most powerful and sensitive permissions cannot be automated through SCIM alone.
SCIM syncs your IdP groups to Atlassian, but these groups don't automatically grant access to Atlassian products. You still need to:
Add users to the default product access groups (jira-software-users, confluence-users, etc.)
Manage the disconnect between your IdP group structure and Atlassian's required groups
This creates a gap between identity management and access management that requires manual work or custom solutions.
SCIM typically focuses on internal, managed users. But what about:
External collaborators
Contractors with non-company email addresses
Self-registered users
Manually invited users
SCIM provides little control over these edge cases, leaving potential security gaps in your user management.
SCIM is a synchronization protocol, not a workflow engine. It can't:
Apply conditional logic (e.g. "if user is in group X and not in group Y, then...")
Execute time-based actions (e.g. temporary access)
Combine multiple criteria for sophisticated access decisions
For complex organizations, this lack of flexibility creates significant limitations.
SCIM operates on an event-driven model, lacking capabilities for:
Time-based access provisioning or deprovisioning
Scheduled permission cleanups
Temporary access management
This creates significant gaps for organizations needing to implement time-sensitive access controls.
These limitations force administrators to create workarounds that introduce risk and consume time:
Manual processes to supplement SCIM
Custom scripts that need ongoing maintenance
Overly broad permissions to simplify management
Delayed access changes due to synchronization gaps
Security risks from incomplete offboarding
One administrator we spoke with estimated they were spending 10+ hours per week on tasks that SCIM should theoretically handle but doesn't.
Admin Automation was specifically designed to address these SCIM limitations while working alongside your existing SCIM setup. Here's how it fills the critical gaps:
Create rules that automatically:
Add appropriate users to site-admins, org-admins and other protected admin groups based on your IdP group membership
Remove admin access when users are removed from authorized IdP groups
Implement just-in-time admin access for temporary elevation of privileges
Example rule:
Select all users in [idp-administrators] group
Then add to [org-admins] group
Run hourly
Automatically:
Add users from your SCIM-synced groups to the appropriate Atlassian product access groups
Remove users from product access groups when they're removed from SCIM groups
Create a consistent connection between identity and access
Example rule:
Select all users in [jira-software-users] group
Filter out users not in [idp-jira-users] group
Then remove from [jira-software-users] group
Run hourly
Create rules to:
Automatically identify users with non-corporate emails
Apply appropriate rules based on email domains
Suspend or restrict access for users who don't meet your governance requirements
Regularly audit external collaborators
Example rule:
Select all users
Filter to only include non-corporate email domains
Then suspend user access
Run daily
Implement sophisticated automation with:
Multiple selection criteria and filters
Time-based actions
Complex condition chains
Example rule:
Select users from [contractors] group
Filter to exclude users from [active-projects] group
Then remove from [jira-software-users] group
Run weekly
Implement sophisticated time-based governance with:
Scheduled permission cleanups
Temporary access management
Automated periodic governance
Example rule:
Select users from [temporary-access] group
Run once on [end-date]
Then remove from [jira-software-users] group
A financial services company with strict compliance requirements struggled with SCIM's inability to manage site-admin access. By implementing Admin Automation, they:
Created rules to manage admin access based on their IdP groups
Implemented temporary admin access for certain roles
Reduced manual admin tasks by 85%
Eliminated compliance findings related to excessive privileges
A healthcare provider needed to strictly control access for physicians and external researchers. They used Admin Automation to:
Create domain-specific rules for different user types
Automatically manage access to sensitive projects
Implement auto-expiry for temporary researchers
Reduce offboarding risk with redundant controls
A rapidly growing tech company found their SCIM setup couldn't keep pace with their complex organizational structure. Admin Automation allowed them to:
Create department-specific access rules
Manage project access across multiple products
Implement sophisticated role-based access control
Scale user management without adding admin headcount
If you're experiencing SCIM limitations in your Atlassian environment, here's how to get started with a complementary automation strategy:
Audit your current SCIM implementation - Identify specific gaps and manual processes
Prioritize your biggest pain points - Target the areas consuming the most admin time
Implement complementary automation - Start with rules that address your top challenges
Measure the results - Track time savings and security improvements
By combining SCIM's strengths with targeted automation for its limitations, you can create a comprehensive, secure, and efficient user management system for your Atlassian environment.
Ready to overcome your SCIM limitations? Try Admin Automation today and see how it can complement your existing identity management strategy.
You can also read more about the common use cases that Admin Automation supports on our website.
Kieren _SmolSoftware_
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
0 comments