Training Platform - How do I deactivate SCIM-provisioned users (SCIM Deprovisioning)?
For users provisioned via SCIM, the Identity Provider (IdP) is the source of truth. Users must be deactivated in the IdP so Living Security can receive the update and mark the user as inactive (active = false).
Here are how various SCIM providers trigger deactivation.
Okta (Identity Provider)
For users provisioned via Okta SCIM, deactivation must be initiated in Okta.
Option 1: Unassign the user from the Living Security app (recommended)
-
In Okta, navigate to the Living Security application.
-
Go to Assignments.
-
Remove (unassign) the user from the application.
Unassigning the user sends a SCIM update that sets the user to inactive (active = false) in Living Security.
Option 2: Deactivate the user in Okta
-
Deactivate the user at the Okta directory level.
This option requires Deactivate Users to be enabled under
View OKTA support articles for most update to information
Applications → Living Security → Provisioning → To App.
Microsoft Entra ID (Azure AD)
For users provisioned via Microsoft Entra ID (Azure AD), deactivation must be initiated in Entra.
Option 1: Remove the user from the Living Security enterprise application (recommended)
-
In Entra ID, open Enterprise Applications → Living Security.
-
Go to Users and groups.
-
Remove the user assignment.
Removing the assignment sends a SCIM update that sets the user to inactive (active = false) in Living Security.
Option 2: Disable the user in Entra ID
-
Disable the user account in Entra ID.
This works only if Disable Account / Provisioning Status is configured to push deactivations in the SCIM provisioning settings.
View MS Entra ID support articles for most update to information
OneLogin
For users provisioned via OneLogin SCIM, deactivation must be initiated in OneLogin.
Option 1: Unassign the user from the Living Security app (recommended)
-
Open the Living Security application in OneLogin.
-
Remove the user from the app assignment.
This sends a SCIM update marking the user as inactive (active = false).
Option 2: Disable the user in OneLogin
-
Disable the user at the directory level.
This triggers a SCIM deactivation only if user deprovisioning is enabled for the app.
View OneLogin support articles for most update to information
Google Workspace
For users provisioned via Google Workspace SCIM, deactivation must be initiated in Google.
Option 1: Remove the user from the Living Security SCIM app (recommended)
-
In Google Admin, open Apps → Web and mobile apps → Living Security.
-
Remove the user assignment.
This sends a SCIM update setting the user to inactive (active = false).
Option 2: Suspend the user account
-
Suspend the user in Google Workspace.
Suspension may trigger deactivation depending on the SCIM configuration, but removing app access is the most reliable method.
View Google Workspace support articles for most update to information
Key Notes (Applies to All SCIM Providers)
-
SCIM deactivation sets
active = false; users are not deleted. -
Manual deactivation in Living Security will not persist if SCIM is enabled.
-
Removing the user from the app assignment is the most reliable and consistent method across all IdPs.
-
If a user does not deactivate as expected, confirm:
-
SCIM provisioning is enabled
-
Deactivation/deprovisioning is allowed in the IdP app settings
-
The user was originally created via SCIM (not manually)
-