Our SCIM support will now allow users to assign Sentry Org Roles to users. Additionally, any assignments made via SCIM going forward cannot be edited via the Sentry UI or API i.e. your IdP will become the single source of truth governing who can access Sentry and what they can do with their access.
Enabling our customers to use their IdP as a single source of truth for user access and privilege assignment reduces administrative overhead and increases the security of data stored in Sentry.
While you can continue to use SCIM as normal, any assignments made via SCIM going forward can only be edited via SCIM.
To start assigning user roles via SCIM you can either: 1) Add an Org Role to a user’s IdP profile. OR 2) Create a group attribute for an Org Role and assign it to an IdP group.
Absolutely, just be aware that future assignments made via SCIM can only be edited via SCIM.
Here’s a quick look at how Sentry handles your personal information (PII).
×We collect PII about people browsing our website, users of the Sentry service, prospective customers, and people who otherwise interact with us.
What if my PII is included in data sent to Sentry by a Sentry customer (e.g., someone using Sentry to monitor their app)? In this case you have to contact the Sentry customer (e.g., the maker of the app). We do not control the data that is sent to us through the Sentry service for the purposes of application monitoring.
Am I included?We may disclose your PII to the following type of recipients:
You may have the following rights related to your PII:
If you have any questions or concerns about your privacy at Sentry, please email us at compliance@sentry.io.
If you are a California resident, see our Supplemental notice.