Stitchflow
Hyperproof logo

Hyperproof User Management API Guide

API workflow

How to automate user lifecycle operations through APIs with caveats that matter in production.

UpdatedMar 17, 2026

Summary and recommendation

Hyperproof exposes a REST API at https://api.hyperproof.io/v1 authenticated via Bearer token, generated under Settings > Integrations > API Tokens.

Public API documentation is largely gated;

endpoint-level capabilities, user object field schemas, and pagination behavior are not fully indexed in public docs.

Rate limit specifics are undocumented - contact Hyperproof support before building any high-frequency automation against the REST layer.

SCIM 2.0 is available at https://api.hyperproof.io/scim/v2 and is the recommended path for automated user lifecycle management;

it uses a separate bearer token from the REST API token.

API quick reference

Has user APIYes
Auth methodAPI Key (Bearer token); OAuth 2.0 not confirmed in public docs
Base URLOfficial docs
SCIM availableYes
SCIM plan requiredContact vendor; SSO is a prerequisite. Pricing context suggests Business or Enterprise tier (~$25K+/year) based on available pricing seeds, but not officially confirmed.

Authentication

Auth method: API Key (Bearer token); OAuth 2.0 not confirmed in public docs

Setup steps

  1. Log in to Hyperproof as an Organization Admin.
  2. Navigate to Settings > Integrations > API Tokens.
  3. Generate a new API token and copy the value.
  4. Include the token in the Authorization header as: Authorization: Bearer .

User object / data model

Field Type Description On create On update Notes
userName string Primary login identifier, typically the user's work email. required optional Mapped from the IdP through SCIM.
active boolean Whether the Hyperproof account is active. optional optional Used for deprovisioning via SCIM.
name object Structured name fields such as givenName and familyName. optional optional Validate exact required mappings in your tenant.

Core endpoints

List users via SCIM

  • Method: GET
  • URL: {tenant-scim-endpoint}/Users
  • Watch out for: The tenant-specific SCIM endpoint must be copied from Hyperproof's provisioning settings rather than assumed from the generic base URL.

Request example

GET /Users?startIndex=1&count=100

Response example

{"Resources":[{"id":"123","userName":"user@example.com","active":true}],"totalResults":1}

Deactivate user via SCIM

  • Method: PATCH
  • URL: {tenant-scim-endpoint}/Users/{id}
  • Watch out for: Hyperproof's public docs describe SCIM behavior at a high level; validate supported attributes in a non-production org first.

Request example

PATCH /Users/123 {"Operations":[{"op":"Replace","path":"active","value":false}]}

Response example

{"id":"123","active":false}

Rate limits, pagination, and events

  • Rate limits: Rate limit specifics are not publicly documented by Hyperproof.

  • Rate-limit headers: Unknown

  • Retry-After header: Unknown

  • Rate-limit notes: No official rate-limit documentation found. Contact Hyperproof support for current limits.

  • Pagination method: offset

  • Default page size: Not documented

  • Max page size: Not documented

  • Pagination pointer: startIndex / count

  • Webhooks available: Unknown

  • Webhook notes: No official webhook documentation for user-management events was found in public Hyperproof docs.

  • Alternative event strategy: Use SCIM provisioning via your IdP for automated user lifecycle management.

SCIM API status

  • SCIM available: Yes

  • SCIM version: 2.0

  • Plan required: Contact vendor; SSO is a prerequisite. Pricing context suggests Business or Enterprise tier (~$25K+/year) based on available pricing seeds, but not officially confirmed.

  • Endpoint: https://api.hyperproof.io/scim/v2

  • Supported operations: Create User, Update User, Deactivate User, List Users

Limitations:

  • SSO must be configured before SCIM provisioning can be enabled.
  • Exact SCIM endpoint URL is provisioned per-organization and may differ from the generic base shown here.
  • Group/role provisioning support is not confirmed in public documentation.
  • SCIM token is separate from the REST API token and is generated in the SSO/SCIM settings panel.

Common scenarios

The primary automation scenario is IdP-driven provisioning via SCIM 2.0.

SSO (SAML or OIDC) must be fully configured before SCIM can be enabled - activating SCIM without a working SSO configuration will fail.

Once SCIM is active, standard IdP platforms (Okta, Entra ID) can drive Create, Update, Deactivate, and List User operations using the org-specific SCIM base URL and token copied from Settings > SCIM Provisioning.

Deprovisioning sends a PATCH /Users/{id} with active=false;

the user record is retained with audit history intact, and hard deletion requires a separate manual admin action.

For REST API access, generate a token under Settings > Integrations > API Tokens, store it in a secrets manager, and include it as Authorization: Bearer on all requests

token expiry and rotation policies are not publicly documented, so monitor for 401 responses as a signal to rotate.

Provision users via SCIM from an IdP

  1. Configure SSO (SAML or OIDC) in Hyperproof Settings > SSO.
  2. Navigate to Settings > SCIM Provisioning and enable SCIM.
  3. Copy the SCIM base URL and Bearer token displayed.
  4. In your IdP (e.g., Okta, Entra ID), add a new SCIM 2.0 application using the copied URL and token.
  5. Assign users or groups in the IdP to trigger provisioning to Hyperproof.

Watch out for: SSO must be fully functional before SCIM provisioning is activated. Deprovisioning (deactivate) behavior should be tested in a non-production org first.

Deactivate a user via SCIM

  1. In your IdP, unassign the user from the Hyperproof SCIM application.
  2. The IdP sends a PATCH /Users/{id} with active=false to the Hyperproof SCIM endpoint.
  3. Hyperproof deactivates the user account; the user loses access on next login attempt.

Watch out for: Deactivation via SCIM does not delete the user record; historical audit data is retained. Hard deletion may require manual admin action.

Authenticate to the REST API

  1. Generate an API token in Hyperproof Settings > Integrations > API Tokens.
  2. Store the token securely (e.g., in a secrets manager).
  3. Include header: Authorization: Bearer on all REST API requests to https://api.hyperproof.io/v1.

Watch out for: Token scope and expiry policies are not publicly documented; rotate tokens periodically and monitor for 401 responses indicating token invalidation.

Why building this yourself is a trap

Building a direct REST API integration for user lifecycle management in Hyperproof carries meaningful risk given the sparse public documentation: endpoint schemas, pagination behavior, and rate limits are all unconfirmed. The SCIM token and REST API token are distinct credentials - conflating them will produce authentication failures that are non-obvious to debug.

Group and role provisioning support via SCIM is unconfirmed in public docs, which limits how far identity graph automation can propagate role assignments without manual fallback. Plan-tier gating for SCIM is not officially published; assume enterprise-tier requirements and validate with the vendor before scoping any integration that depends on SCIM availability.

Automate Hyperproof workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 17, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

15Five logo

15Five

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

15Five uses a fixed role-based permission model with six predefined roles: Account Admin, HR Admin, Billing Admin, Group Admin, Manager, and Employee. No custom roles can be constructed. User management lives at Settings gear → People → Manage people p

1Password logo

1Password

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

1Password's admin console at my.1password.com covers the full user lifecycle — invitations, group assignments, vault access, suspension, and deletion — without any third-party tooling. Like every app that mixes role-based and resource-level permissions

8x8 logo

8x8

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

8x8 Admin Console supports full lifecycle user management — create, deactivate, and delete — across its X Series unified communications platform. Every app a user can access (8x8 Work desktop, mobile, web, Agent Workspace) is gated by license assignmen