System for Cross-domain Identity Management (SCIM) lets your identity provider automatically manage user accounts in Claude for Government. With SCIM, your IdP controls who has access, what role they hold, and what seat tier they're assigned—without manual intervention in the Claude admin console.
For SCIM setup on Claude Enterprise, see Set up JIT or SCIM provisioning.
How SCIM differs for Claude for Government
Claude for Government uses a first-party SCIM implementation hosted within the FedRAMP-authorized environment. The commercial Claude Enterprise plan uses a different SCIM backend.
Feature | Claude for Government | Claude Enterprise |
SCIM endpoint | claude.fedstart.com/v1/scim/v2 | Configured via claude.ai |
SCIM implementation | Anthropic first-party (FedRAMP-authorized) | Third-party integration |
API key management | Self-service via identity settings page | Self-service via admin settings |
Parent Organization Support | Yes — for multi-org identity management | Not applicable |
Prerequisites
Before setting up SCIM, you must complete:
SSO configuration — Complete the steps outlined in the SSO setup guide.
Domain verification — Your login domain must be verified (this is completed during SSO setup).
IdP admin access — Permission to configure a SCIM integration in your identity provider.
How provisioning works with and without SCIM
Without SCIM, Claude for Government uses just-in-time (JIT) provisioning: any user who authenticates through SSO is automatically assigned a seat, as long as licenses are available. You control who can authenticate by managing membership in the SAML application within your IdP.
With SCIM, login and provisioning are separate. Your IdP tells Anthropic who should have access and at what role/tier. SSO is used only for authentication. This gives you fine-grained control over roles, seat tiers, and offboarding.
Step 1: Generate a SCIM API key
Navigate to claude.fedstart.com/admin-settings/identity.
In the SCIM section, generate a new API key.
Copy the key — you'll need it when configuring your IdP.
Important: Store this key securely. It cannot be retrieved after you leave the page.
Step 2: Configure SCIM in your Identity Provider
In your IdP (e.g., Entra ID, Okta), create or open a SCIM provisioning integration.
Enter the following values:
SCIM endpoint URL: https://claude.fedstart.com/v1/scim/v2
API key / Bearer token: The key generated in Step 1
Configure the user attributes your IdP will sync (typically name and email).
Assign users and groups to the SCIM integration within your IdP.
Step 3: Verify sync status
After enabling the integration in your IdP:
Return to the identity settings page at claude.fedstart.com/admin-settings/identity.
Check the SCIM sync status indicator to confirm users are syncing.
Warning: When you fully enable SCIM provisioning, any users who were not synced via SCIM will be removed from the organization. Confirm that all expected users appear in the sync before proceeding.
Step 4: Map groups to roles and seat tiers
SCIM provisioning uses IdP groups to assign roles and seat tiers within Claude for Government.
On the identity settings page, open the role mappings table.
For each IdP group, assign:
Role — The user's role within the organization (e.g., Member, Owner).
Seat tier — The license tier, if your organization has purchased multiple tiers.
Save your mappings.
If you manage multiple organizations under a single parent (see below), each organization maintains its own role and seat tier mappings. Switch between organizations using the organization selector in the bottom-left corner of the page.
Parent organizations (multi-org setups)
Every Claude for Government organization belongs to a parent organization. For most customers, this is transparent—a parent is created automatically during provisioning and contains a single child organization.
Parent organizations become relevant when multiple organizations share a login domain. Common scenarios include:
Regional offices that purchase Claude for Government independently but share an email domain.
Sub-departments within an agency that require data separation (e.g., preventing cross-org sharing of chats or projects).
In a multi-org setup:
Identity settings (IdP configuration and SCIM) are managed at the parent organization level.
Role and seat tier mappings are configured per child organization, allowing different groups to map to different orgs.
Any Owner or Primary Owner in a child organization can manage IdP settings. Restrict these roles to centralized IT staff.
Note: Anthropic support will work with you during provisioning to configure parent/child organization relationships. Contact your account representative or Anthropic support if you need to set up a multi-org structure.
