To set up the provisioning and management of your New Relic users from an identity provider, we provide a SCIM API for the identity providers that don't already have New Relic-specific apps and implementations.
Who should use the SCIM API?
If you have an identity provider that has a New Relic app (Azure AD, Okta, and OneLogin), see the guides for those. The SCIM API is meant for organizations that either aren't using those identity providers, or that want to use the SCIM API for additional configuration not available with the apps (for example, managing user type). Additional restrictions:
- Ping Identity's PingOne is not supported because it doesn't allow provisioning of groups.
Before using our SCIM API, you should first set up an authentication domain with SCIM enabled. The authentication domain UI will give you values that you can use to integrate with your identity provider.
Note that after you set up an integration with the SCIM API, there are next steps to do, including downgrading some users to basic users, and granting user groups access to New Relic accounts.
Our SCIM API tutorial
This doc contains technical information about our SCIM API. For detailed instructions on using it, see the SCIM API tutorial.
SCIM service provider
Our SCIM service provider follows the SCIM 2.0 API as described in RFCs 7643 and 7644. You do not need to implement all aspects of the SCIM 2.0 specification to integrate your user information with New Relic. In fact, the New Relic service provider itself does not implement all aspects of the specification. This document describes the features from the specification available for an integration with New Relic.
Authentication
Authentication requires a bearer token. This bearer token is specific to your New Relic authentication domain and is displayed when first enabling SCIM for an authentication domain.
Supported resources
The New Relic service provider supports the following SCIM resources: Group
, User
, Service provider config
, Resource type
and Schema
. Bulk
and Search
are not supported. For more information on how the RFC describes the resource endpoints, see RFC 7644 SCIM Protocol Specification.
Schemas
New Relic uses a subset of the available fields in the SCIM core schema. Other SCIM fields are ignored if they are included in incoming requests. The fields used by New Relic are:
Group
:
SCIM field name | Description |
---|---|
| Required. Name of the group. |
| List of users in the group. |
User
:
SCIM Field Name | Description |
---|---|
| Unique identifier for the user used by your system. |
| Required. Unique identifier for the user within New Relic’s system. Use the user’s email address. |
| Last name of the user. |
| First name of the user. |
| Required. Email address of the user. |
| Time zone of the user in IANA Time Zone database format, also known as the "Olson" time zone database format (for exmaple, "America/Los_Angeles"). |
| Required. Boolean indicating whether or not the user should be active or inactive within New Relic. |
| List of groups to which the user belongs. |
New Relic user type (basic, core, or full) schema
This is an optional schema extension for New Relic-specific user attributes. Currently this provides control only over a user's user type. For a tutorial showing how to use this, see the SCIM API tutorial.
urn:ietf:params:scim:schemas:extension:newrelic:2.0:User
:
SCIM field name | Description |
---|---|
| The user type: |
Supported actions
SCIM provides several options for manipulating groups and users. The New Relic service provider supports the following options.
When configuring, be aware that:
- Only simple filtering is supported. The
eq
operator may be used with a basic filter expression. For example,“displayName eq "Example Group 1”
. Other operators are not supported. PUT
updates do not require that all fields be included. Fields that are not included will not be changed. When doing aPUT
, if a required field already has the appropriate value, it is not necessary to include the field.
Supported actions are:
Deviations from the RFC
This section describes areas where the New Relic SCIM service provider deviates from the SCIM protocol RFC 7644. Section numbers refer to RFC section numbers.
Items in this section could change as we work to bring our service provider into full compliance with the RFC.
RFC section name | RFC section number | Deviation description |
---|---|---|
Creating Resources |
| |
Filtering |
| |
|
| |
Service Provider Configuration Endpoints |
| |
Bearer Token and Cookie Considerations |
|
Next steps when you're done
Next steps:
Adjust your users' user type
When your users are provisioned in New Relic, you can see them in the User management UI.
If you're adding users to New Relic via SCIM but not managing their user type via SCIM, they start out as basic users. To upgrade users, you have two options:
- Use the User management UI.
- Use the SCIM API to manage user type.
Assign group access
Once your users are in New Relic, you need to grant them access to specific New Relic accounts, specific groups, and specific roles. Without doing this, your users have no access to New Relic accounts. To learn how to do this, see:
Set up SAML SSO
If you want to set up SAML SSO, which most SCIM users do, see the SAML SSO docs.