Summary and recommendation
Island supports SCIM 2.0 provisioning at the Enterprise plan tier, covering Create User, Update User, and Deactivate User operations.
The SCIM endpoint URL is tenant-specific and provisioned per-customer;
it is not published in any public developer reference.
The bearer token and endpoint URL must both be retrieved from inside the Island management console - or via direct support engagement if the provisioning section is not yet activated.
No public REST API reference, developer portal, rate limit documentation, pagination spec, or webhook support was identified during research.
API quick reference
| Has user API | Yes |
| Auth method | Bearer token for the tenant-specific SCIM endpoint |
| Base URL | Tenant-specific SCIM 2.0 endpoint provisioned in the Island management console |
| SCIM available | Yes |
| SCIM plan required | Enterprise |
Authentication
Auth method: Bearer token for the tenant-specific SCIM endpoint
Setup steps
- Log in to the Island management console as an administrator.
- Open the identity or provisioning section.
- Generate or reveal the tenant-specific SCIM endpoint URL and bearer token.
- Use that endpoint and token in your IdP's SCIM connector configuration.
User object / data model
| Field | Type | Description | On create | On update | Notes |
|---|---|---|---|---|---|
| userName | string | Primary login identifier, typically the user's work email. | required | optional | Mapped from the IdP through SCIM. |
| active | boolean | Whether the Island account is active. | optional | optional | Used for deprovisioning via SCIM. |
| name | object | Structured name fields such as givenName and familyName. | optional | optional | Available according to standard SCIM semantics; validate required mappings in your tenant. |
Core endpoints
Create user via SCIM
- Method: POST
- URL:
{tenant-scim-endpoint}/Users - Watch out for: The base SCIM endpoint is tenant-specific and must be retrieved from the Island management console.
Request example
POST /Users {"userName":"user@example.com","active":true}
Response example
{"id":"123","userName":"user@example.com","active":true}
Update or deactivate user via SCIM
- Method: PATCH
- URL:
{tenant-scim-endpoint}/Users/{id} - Watch out for: Treat supported attributes and PATCH behavior as tenant-specific until validated in your IdP test tenant.
Request example
PATCH /Users/123 {"Operations":[{"op":"Replace","path":"active","value":false}]}
Response example
{"id":"123","active":false}
Rate limits, pagination, and events
Rate limits: No public rate-limit policy is documented for Island's tenant-specific SCIM endpoint.
Rate-limit headers: No
Retry-After header: No
Rate-limit notes: Treat rate limits as undocumented and validate behavior with Island support before running large syncs.
Pagination method: offset
Default page size: Not documented
Max page size: Not documented
Pagination pointer: startIndex / count
Webhooks available: No
Webhook notes: No publicly documented webhook support found in Island's official documentation.
Alternative event strategy: Not documented
SCIM API status
SCIM available: Yes
SCIM version: 2.0
Plan required: Enterprise
Endpoint: Not documented
Supported operations: Create User, Update User, Deactivate User
Limitations:
- SCIM endpoint URL is provisioned per-tenant and not publicly documented; must be obtained from Island admin console or support.
- Detailed supported operations, attribute mappings, and group provisioning capabilities are not publicly documented.
- Requires Enterprise plan (custom pricing, starting ~$25,000/year per pricing seed data).
- No public IdP-specific integration guides (Okta, Entra, Google Workspace, OneLogin) found in publicly accessible documentation.
Common scenarios
The primary supported automation scenario is IdP-driven SCIM provisioning (e.g., Okta, Entra ID, Google Workspace, OneLogin).
The integration pattern follows standard SCIM 2.0 flows: generate a bearer token and tenant SCIM endpoint in the Island admin console, configure the IdP connector with those credentials, map attributes, and validate with a test user assignment.
However, IdP-specific integration guides are not publicly documented, and attribute mapping details must be sourced from the Island admin console directly.
For teams building identity graph automation or lifecycle orchestration, the absence of public pagination specs, rate limit headers, and webhook events means every integration assumption must be validated with Island support before production deployment.
Provision users via SCIM from an IdP
- Log in to the Island management console with an admin account.
- Navigate to the Identity/Provisioning section to generate a SCIM bearer token and obtain the tenant-specific SCIM endpoint URL.
- Configure your IdP (e.g., Okta, Entra ID) with the Island SCIM endpoint URL and bearer token.
- Map IdP user attributes to Island SCIM attributes as documented in the Island admin console.
- Test provisioning by assigning a user in the IdP and verifying the user appears in Island.
Watch out for: The SCIM endpoint URL and token are tenant-specific and not publicly documented; they must be retrieved from the Island admin console. Contact Island support if the provisioning section is not visible, as it may require Enterprise plan activation.
Why building this yourself is a trap
The primary integration risk is documentation opacity: Island publishes no public API reference, no rate limit or pagination documentation, and no webhook events. Developers cannot pre-validate endpoint behavior, error response shapes, or attribute mapping coverage without live console access - which requires an active Enterprise contract.
SCIM group provisioning capabilities are not publicly documented, making it unsafe to assume standard SCIM group push behavior without explicit confirmation. Do not assume standard SCIM defaults for rate limits or pagination apply; treat all undocumented behavior as unconfirmed until verified directly with Island support.
Automate Island workflows without one-off scripts
Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.