# CloudGate Provisioning

## **Overview**

This guide covers CloudGate Automated Provisioning with SCIM which will update and deactivate Keeper user accounts as changes are made in CloudGate.

{% hint style="info" %}
You can configure SCIM without SSO or SSO+SCIM
{% endhint %}

## **Requirements**

To setup Keeper user provisioning with CloudGate, you need to have access to the [Keeper Admin Console](https://keepersecurity.com/console) and a CloudGate Admin account.

## User Provisioning SSO+SCIM

{% hint style="info" %}
IMPORTANT: If you want your users to authenticate via SSO / SAML 2.0 with CloudGate, you must first configure and install Keeper SSO Connect with CloudGate.\
\
View the full SSO Connect setup guides:\
SSO Connect Cloud: [https://docs.keeper.io/sso-connect-cloud/](https://docs.keeper.io/sso-connect-cloud)\
\
Once Complete, proceed to **Step 7:** in the guide below.
{% endhint %}

{% hint style="info" %}
If you just want to provision users via SCIM provisioning without SSO, proceed to the guide below.
{% endhint %}

## User Provisioning (SCIM)

### **Configuration Steps**

### Step 1: Add SCIM Provisioning Method for CloudGate

Navigate to your Keeper Admin console and add the **SCIM Provisioning Method** to your desired "**Node**".

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FVsQ33jUSvHNKWa9dpPEJ%2Fimage.png?alt=media&#x26;token=470be045-559d-4b89-bd9c-da9033e15046" alt=""><figcaption><p>Add SCIM for CloudGate</p></figcaption></figure>

### Step 2: Select SCIM Provisioning Method

Select "**SCIM (System for Cross-Domain Identity Management)**" and select "**Next**".

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FzjtMyi6JGrTudxStOfCm%2Fimage.png?alt=media&#x26;token=f1047ee6-7248-414a-a2a9-d31c0eeae3b7" alt=""><figcaption><p>Select SCIM</p></figcaption></figure>

### Step 3: Generate SCIM Token

At the next screen select "**Generate**" to generate your Token to connect your SCIM provisioning method.

![Generate SCIM Token](https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LO5CAzpxoaEquZJBpYz%2F-MMSQnEOEb4SlUAq9HZV%2F-MMSSeuTmqdNRV9BUB80%2Fjc-scimgen.PNG?alt=media\&token=30d58630-ad74-4073-a1e9-f0e56f49f652)

### Step 4: Save SCIM Provisioning Method

At the next screen, you will be presented with your URL and Token. You will need this information for the step 8 to configure the SCIM section of the Keeper SSO Application within CloudGate. Select "**Save**".

![](https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FZKjSN6tIUl2k8yGR3mcB%2FSCIM_Setting_Keeper%232.png?alt=media\&token=01055cdc-e604-45bd-adef-25541c0e0d98)

You will now see your SCIM Provisioning Method in a **Pending** State.

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FHbGeIR6SyeDxnqfJfelF%2Fimage.png?alt=media&#x26;token=cf7864a4-07e6-4745-a5e8-4a919e41e889" alt=""><figcaption><p>SCIM Pending</p></figcaption></figure>

### Step 5: Add Keeper Application to CloudGate

Navigate to your CloudGate **Admin Console -> Service Provider** and select the **Add service provider** to add **Keeper Password Manager** to the list of your SSO applications.

![Add Keeper App to CloudGate SSO](https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FXr4FnybHJmxFSnlO2cjr%2FAdd_SP%231.png?alt=media\&token=7d638739-69ec-415c-946b-5748907c29c5)

### Step 6: Configure Keeper Application

On the "**ADD SERVICE PROVIDER**" page, search for **Keeper Security** in the search bar. Select **Add** on the Keeper SSO Cloud Connect icon.

![Configure Keeper App](https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2F0rM7jrLPfOmwxIPpmD4e%2FAdd_SP%232.png?alt=media\&token=f40ae909-caf3-41d5-bc4c-b688c6e8496f)

### Step 7: Configure SCIM within Keeper Application

Click "edit" on the Keeper SSO Cloud Connect icon you created at SERVICE PROVIDERS page and go to the provisioning settings tab.

![Configure SCIM](https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FPq8tIefjClkj9mQoQNlv%2FSCIM_Setting_Keeper%235.png?alt=media\&token=e24b6508-2f89-419d-bdd0-623781bdbd9a)

### Step 8: Activate SCIM

This is where you will supply the previously generated URL and Token within the SCIM Provisioning Method in your Keeper Admin Console at the step 4. Now you can click "Test" to check if the SCIM provisioning is OK.

![](https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2Fklzu2oHGdYqZUskpzqft%2FSCIM_Setting_Keeper%236.png?alt=media\&token=4618b236-241c-4f18-b380-9ee6ab4bbc1b)

### Step 9: Save Keeper Application

Select "**save**".

![Save SCIM](https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FZlG9W6WU9Nyd81E8Wasj%2FSCIM_Setting_Keeper%237.png?alt=media\&token=50b025c1-aa27-4db6-a6de-cfa0677ccf11)

User provisioning with CloudGate is complete. Moving forward, new users who have been configured to use Keeper, in CloudGate and are within the provisioning scope definitions, will receive invites to utilize the Keeper Vault and will be under the control of CloudGate.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.keeper.io/en/enterprise-guide/user-and-team-provisioning/cloudgate-provisioning-with-scim.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
