title: System for Cross-domain Identity Management (SCIM) MCP Server colorFrom: pink colorTo: blue sdk: docker appport: 7860 pinned: false shortdescription: SCIM 2.0 relay for AI agents to manage identities - building-mcp-track-enterprise scim-mcp is a SCIM (System for Cross-domain Identity Management) relay for AI agents. This MCP server enables LLMs to manage enterprise user identities and group
Add this skill
npx mdskills install chenhunghan/scim-mcpComprehensive SCIM 2.0 relay with strong privacy features and clear documentation
1---2title: System for Cross-domain Identity Management (SCIM) MCP Server3emoji: 🌖4colorFrom: pink5colorTo: blue6sdk: docker7app_port: 78608pinned: false9short_description: SCIM 2.0 relay for AI agents to manage identities10tags:11 - building-mcp-track-enterprise12---13# SCIM Relay for Agents1415**scim-mcp** is a SCIM (**S**ystem for **C**ross-domain **I**dentity **M**anagement) relay for AI agents. This MCP server enables LLMs to manage enterprise user identities and groups through the battle-tested SCIM 2.0 standard ([RFC7644](https://datatracker.ietf.org/doc/html/rfc7644)). It acts as a privacy first relay between AI agents and service providers (SP) or identity providers (IdP), allowing organizations to provision, de-provision, and manage authorization policies.1617[Post on Social Media](https://www.linkedin.com/posts/chenhunghan_just-submittedscim-mcpto-the-mcp-1st-share-7398413559698829313-JSdb?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAj_AusB-Fxn1XTCx1_2KoYCcGej21tCMPI)1819[Demo](https://huggingface.co/spaces/chenhunghan/scim-mcp)20212223## Features2425Full SCIM 2.0 user and group lifecycle management with **built-in PII masking** for GDPR/privacy compliance:2627**Privacy & Compliance:**28- **PII Masking** - Automatically masks sensitive personal data (emails, phone numbers, names, addresses) in LLM responses to minimize PII exposure while maintaining operational utility. Critical for GDPR Article 5 (data minimization) and Article 25 (privacy by design) compliance when AI agents process identity data.2930**User Operations:**31- **POST** - Create users with core and enterprise schema attributes ([RFC7644 §3.3](https://datatracker.ietf.org/doc/html/rfc7644#section-3.3))32- **GET** - Retrieve user information ([RFC7644 §3.4.1](https://datatracker.ietf.org/doc/html/rfc7644#section-3.4.1))33- **PUT** - Replace user records entirely ([RFC7644 §3.5.1](https://datatracker.ietf.org/doc/html/rfc7644#section-3.5.1))34- **PATCH** - Update specific user attributes ([RFC7644 §3.5.2](https://datatracker.ietf.org/doc/html/rfc7644#section-3.5.2))35- **DELETE** - Remove users ([RFC7644 §3.6](https://datatracker.ietf.org/doc/html/rfc7644#section-3.6))36- **Deactivation** - Disable user accounts by setting `active: false`3738**Group Operations:**39- **POST** - Create groups ([RFC7644 §3.3](https://datatracker.ietf.org/doc/html/rfc7644#section-3.3))40- **GET** - Retrieve group information ([RFC7644 §3.4.1](https://datatracker.ietf.org/doc/html/rfc7644#section-3.4.1))41- **PUT** - Replace group records entirely ([RFC7644 §3.5.1](https://datatracker.ietf.org/doc/html/rfc7644#section-3.5.1))42- **PATCH** - **Add/remove users to/from groups for authorization management** ([RFC7644 §3.5.2](https://datatracker.ietf.org/doc/html/rfc7644#section-3.5.2))43- **DELETE** - Remove groups ([RFC7644 §3.6](https://datatracker.ietf.org/doc/html/rfc7644#section-3.6))4445## Use Cases46471. **Connect Enterprise App Directly** - Manage users and groups directly in your service provider without Azure AD, Okta, or other IdP interfaces482. **SCIM Endpoint Development & Testing** - Validate your SCIM endpoint implementation without setting up Azure AD or Okta493. **Control MCP Server Access** - Use Auth0's [inbound SCIM connector](https://auth0.com/docs/authenticate/protocols/scim/configure-inbound-scim#leverage-integration-galleries-for-streamlined-setup) to manage which OAuth accounts can access which MCP servers5051## Demo5253On Vercel54<https://scim-mcp.vercel.app/mcp>5556On Alpic57<https://scim-mcp-d8a54d7b.alpic.live/>5859[](https://app.alpic.ai/new/clone?repositoryUrl=https://github.com/chenhunghan/scim-mcp)6061## Architecture6263```mermaid64sequenceDiagram65 participant LLM as LLM/AI Agent66 participant MCP as scim-mcp<br/>(MCP Server)67 participant SP as Service Provider<br/>(SCIM Endpoint)6869 Note over MCP: Credentials stored as<br/>environment variables:<br/>SCIM_API_TOKEN<br/>SCIM_API_BASE_URL7071 LLM->>MCP: MCP Tool Request<br/>(e.g., create-user)72 Note over LLM,MCP: No credentials exposed to LLM7374 MCP->>MCP: Retrieve credentials<br/>from environment7576 MCP->>SP: SCIM API Request<br/>Authorization: Bearer {token}7778 SP->>MCP: SCIM Response7980 MCP->>LLM: MCP Tool Response81```8283## Setup8485### Codex8687```toml88[mcp_servers.scim]89command = "npx"90args = ["-y", "mcp-remote@latest", "https://scim-mcp-d8a54d7b.alpic.live/", "--header", "x-scim-api-token:${SCIM_AUTH_TOKEN}", "--header", "x-scim-base-url:https://service.provider.scim.base.url"]91```9293## Development9495First, run the development server:9697```sh98npm run dev99```100
Full transparency — inspect the skill content before installing.