SCIM integration guide 

Follow the steps below to set up SCIM.

Fields
Information to be entered

SCIM connector base URL

Unique identifier field for users

userName 

6. Select Push New Users, Push Profile Updates, and Push Groups

7. Change Authentication Mode to HTTP Header.

8. Enter your SCRIPT Token you created above in the TeamViewer Management Console next to Authorization.

9. Once complete, you can click on Test Connector Configuration, then click Save

Your completed config should look like this:

10. Edit your Provisioning again and tick the Create Users, Update User Attributes, Deactivate Users, and Sync Password checkbox, then click Save

1. Go to the Push Groups tab.

2. Allocate any groups you want pushed to TeamViewer. 

After following the steps above, the SCIM parameters must be adapted to include the customer Identifier.

1. Go to Applications.

2. Open the appropriate app.

3. Switch tab to Provisioning, and scroll down to Attribute Mapping.

4. Press Go to Profile Editor.

5. Click on + Add Attribute.

6. Set the following variables where the external name and external namespace must not be changed:

Fields
Information to be entered

Display name

ssoCustomerId

Variable name

ssoCustomerId

External name

ssoCustomerId

External Namespace

urn:ietf:params:scim:schemas:extension:teamviewer:1.0:SsoUser

Attribute length

Greater than 0

Attribute required

Yes

Attribute type

Personal

User permission
(Not mandatory but recommended) 

Hide

7. Open Mappings for that app.

8. Switch to Okta User to App.

9. Set the customer identifier used also for SSO as a static value.

10. Apply updates now.

11. Under the given Application, click on Provisioning, and the newly created attribute should be visible.

12. Edit the attribute to apply the value only on Create.

Newly provisioned users should now be able to directly log in via their Okta account. 

Known Issues & Limitations

Provisioning in TeamViewer is based on the members of your TeamViewer Company. However, user email addresses need to be unique across all TeamViewer accounts.

Creating new users through Okta Provisioning can fail if the email address is already registered in TeamViewer by another user, even if that user is not part of your TeamViewer Company.

In addition to the above point, removing a user from a TeamViewer company will not delete the user account. Therefore, the Provisioning integration can fail to re-create the user, as the account with the corresponding email address still exists.

Updating the user name/email of the user is not supported by the TeamViewer provisioning integration.