PATCH
/scim/v2/Groups/{groupId}

Authorization

AuthorizationRequiredBearer <token>

< Project ID >:< Access Key > as bearer

In: header

Request Body

application/jsonRequired
userIdstring
groupIdstring
operationsarray<object>

Path Parameters

groupIdRequiredstring
curl -X PATCH "https://api.descope.com/scim/v2/Groups/string" \
  -H "Authorization: Bearer <token>" \
  -H "Content-Type: application/json" \
  -d '{
    "userId": "string",
    "groupId": "string",
    "operations": [
      {
        "op": "string",
        "path": "string",
        "valueString": "string",
        "valueBoolean": true,
        "valueArray": [
          {
            "value": "string",
            "display": "string"
          }
        ],
        "valueID": "string",
        "valueDisplayName": "string"
      }
    ]
  }'

OK

Was this helpful?

Delete SCIM Group DELETE

### Delete an existing SCIM group, using a valid access key. This endpoint allows administrators to delete an existing SCIM group using using the SCIM groupId, which is a required field, and optionally the displayName. It is important to note the bearer token for SCIM API endpoints. The format is `ProjectId:AccessKey` the access key must be associated with the applicable tenant and associated with the tenant admin role. ### See also - See [SCIM Management](/scim) for further details on managing SCIM provisioning. ### Endpoint Authentication Use authorization bearer header with the following format: `Authorization: Bearer <ProjectId:AccessKey>`

Load SCIM User GET

### Load an existing SCIM user, using a valid access key. This endpoint allows administrators to load an existing SCIM user. The response includes the user's object, which includes details about the users including their email, phone, username, name, etc. It is important to note the bearer token for SCIM API endpoints. The format is `ProjectId:AccessKey` the access key must be associated with the applicable tenant and associated with the tenant admin role. ### Next Steps Once you have user data, you can utilize [Update SCIM Group](/api/management/tenants/scim/update-scim-group) to add or remove the user on groups. ### See also - See [SCIM Management](/scim) for further details on managing SCIM provisioning. ### Endpoint Authentication Use authorization bearer header with the following format: `Authorization: Bearer <ProjectId:AccessKey>`