Overview
Bifrost Enterprise uses SCIM-backed identity provisioning to connect your organization’s identity provider to Bifrost. A single configuration gives you:- Single sign-on (SSO) via OAuth 2.0 / OIDC with JWKS-based JWT validation
- Automatic role assignment using custom claims, app roles, or group-to-role mappings
- Team synchronization from IdP groups into Bifrost teams
- Business unit mapping from IdP attributes to Bifrost business units
- Bulk user provisioning with filter-preview before import
- Silent token refresh using server-stored refresh tokens

Supported Identity Providers
Pick your IdP to follow a step-by-step setup guide. All providers share the same Bifrost configuration surface — the only difference is how the OAuth client and role/group claims are created on the provider side.Okta
OIDC with Org or Custom Authorization Servers, plus group-to-role mapping and API tokens for bulk user sync.
Microsoft Entra
Entra ID (Azure AD) with app roles, group claims, and v1.0 / v2.0 token support.
Zitadel
Cloud or self-hosted Zitadel with project-scoped role claims and service-account-based provisioning.
Google Workspace
Google Workspace domains with OAuth login plus optional Directory API sync via a service account.
How it works

- Login — Bifrost redirects unauthenticated users to the provider’s authorization endpoint (Authorization Code flow).
- Token exchange — on callback, Bifrost exchanges the code for an access token and refresh token, stores them in an
HttpOnlycookie / server session, and validates the JWT against the provider’s JWKS. - Identity extraction — configurable JWT claims (
userIdField,rolesField,teamIdsField) are mapped to a Bifrost user, role, and teams. Provider-specific app roles or custom attributes override claim lookup. - Attribute mapping — optional
attributeRoleMappings,attributeTeamMappings, andattributeBusinessUnitMappingstranslate arbitrary claim values (e.g., a department string or Okta group name) into Bifrost roles, teams, or business units. - Bulk import — admins can preview users matching a filter and bulk-import them via the dashboard, which calls the provider’s user directory API.
- Silent refresh — when the access token expires, Bifrost uses the stored refresh token to mint a new one without requiring re-login.
Capabilities
| Capability | Description |
|---|---|
| OAuth 2.0 / OIDC SSO | Authorization Code + PKCE with configurable scopes (openid profile email offline_access). |
| JWKS validation | JWTs are validated against the provider’s published JWKS keys; configuration is cached and auto-refreshed. |
| Role mapping | Map from a claim value (string or array) to Admin / Developer / Viewer or a custom role. Highest-privilege wins when multiple match. |
| Team mapping | Map multiple claim values to Bifrost teams in a single pass (a user can belong to many teams). |
| Business unit mapping | Same as team mapping but scoped to business units. |
| Provisioning preview | Preview up to 50 users matching filters (groups, roles, departments) before importing. |
| Bulk import | Import matched users into Bifrost with role + team + BU assignments applied. |
| Team sync | Sync IdP groups as Bifrost teams with a single action. |
| Business unit sync | Sync IdP organizational units as Bifrost business units. |
| Deprovisioning | Re-running import reconciles removed users and updates role / team assignments. |
| API key pass-through | Requests using Bifrost API keys (bfst-*) bypass SCIM middleware so inference traffic is not affected. |
Configuration reference
All providers share the same outer config shape inconfig.json:
| Field | Required | Description |
|---|---|---|
clientId | Yes | OAuth client ID from the identity provider. |
clientSecret | Usually | Client secret. Required for confidential clients and (where applicable) token revocation. |
audience | Optional | JWT audience to validate against. Defaults vary per provider. |
attributeRoleMappings | Optional | Ordered list of { attribute, value, role } rules evaluated top-to-bottom. |
attributeTeamMappings | Optional | List of { attribute, value, team } rules (all matches apply). |
attributeBusinessUnitMappings | Optional | List of { attribute, value, businessUnit } rules (all matches apply). |
Changing
scim_config at runtime through the UI is applied after saving. For file-based configuration, restart the Bifrost server to pick up changes.Configuring from the dashboard
- Navigate to Governance → User Provisioning in the Bifrost dashboard.
- Select your identity provider from the SCIM Provider dropdown.
- Fill in the provider-specific fields. Required fields are marked and validated on Verify.

- Click Verify to test credentials end-to-end. Bifrost will reach the provider’s JWKS / directory endpoint and report any failures.
- Configure Attribute → Role / Team / Business Unit mappings as needed.
- Toggle Enabled and click Save Configuration.
Attribute mappings
Attribute mappings let you translate claim values into Bifrost roles, teams, or business units without forcing your IdP admins to restructure claim names.
- Role mappings — first match wins. Set a fallback with
"attribute": "*"at the end. - Team mappings and business unit mappings — all matching rules apply, so a user with
department=Platformandgroup=srecan be placed on multiple teams.
realm_access.roles).
Bulk user provisioning
Once SCIM is enabled, import users in bulk from your IdP:- Go to Governance → User Provisioning → Import Users.
- Select a filter — groups, roles, departments, or a custom query depending on provider support.
- Click Preview to see up to 50 matching users.
- Click Import to create them in Bifrost with role / team / BU assignments applied.

Troubleshooting
| Symptom | Likely cause |
|---|---|
| Access denied: no application role or group mapping is assigned to this user. | Make sure you have assigned user to the Bifrost IdP application and they have a valid group/attribute mapping to role in Bifrost |
| Redirect loop on login | Make sure you have restarted pods/Bifrost instance after changing SCIM configuration, or check for a redirect URI mismatch. Exact string match required — check trailing slashes and http vs https. |
invalid audience | audience field does not match the access token’s aud claim. Use the same value your IdP issues. |
| Empty roles / teams | Claim mapping is off. Verify the JWT at jwt.io and check rolesField / teamIdsField. |
| Token refresh failing | offline_access scope missing or refresh token revoked. Re-enable the scope and re-authenticate. |
| First user gets Admin | By design — if no matching role mapping applies, the first user is promoted to Admin so they can finish configuration. Subsequent users default to Viewer. |
Related
- Role-Based Access Control — permissions model and custom roles
- Advanced Governance — budgets, limits, and compliance
- Audit Logs — track authentication events and role changes

