Directory sync events track automated user provisioning through SCIM 2.0 directory connections. These events record directory configuration changes and management portal access for directory sync administration.Documentation Index
Fetch the complete documentation index at: https://docs.centure.ai/llms.txt
Use this file to discover all available pages before exploring further.
All directory sync events include the standard actor, targets, context, and metadata fields. The schemas below show event-specific fields.
directory_sync.delete
Records when a directory sync connection is deleted, disabling automated user provisioning.Triggered When
Admin deletes a directory sync connection from the SSO settings page.Event Schema
directory_sync.deletePage route where directory was deleted (e.g.,
/organizations/[orgId]/sso)Example Event
directory_sync.create_management_portal_url
Records when an admin generates a URL to access the WorkOS directory sync management portal for configuring SCIM connections.Triggered When
Admin requests access to the WorkOS directory sync portal from the SSO settings page.Event Schema
directory_sync.create_management_portal_urlPage route where portal URL was generated (e.g.,
/organizations/[orgId]/sso)Example Event
Supported Directory Providers
Directory sync supports the following provider types:- gsuite directory - Google Workspace directory sync
- azure scim v2.0 - Microsoft Azure AD SCIM 2.0
- okta scim v2.0 - Okta SCIM 2.0
- generic scim v2.0 - Generic SCIM 2.0 providers
Directory sync creation events are not logged because directories are created through the WorkOS portal, which has its own audit trail. Only deletions performed within the Centure platform are tracked.
Related Events
SSO
Single sign-on configuration and connections
Organizations
Organization settings and domain management
Project Memberships
User access grants and role changes
Audit Log Streams
Audit log portal access and SIEM configurations

