diff --git a/backend/app.py b/backend/app.py
index 76958441a6b8e1b9297f9363401fdfc013a06768..5190cf2d5dffd70cd45365b5c7c1ed39e5f42b7a 100644
--- a/backend/app.py
+++ b/backend/app.py
@@ -21,6 +21,7 @@ from areas import resources
 from areas import roles
 from areas import tags
 from cliapp import cliapp
+import config
 import helpers.kubernetes
 import helpers.provision
 import helpers.threads
@@ -49,6 +50,7 @@ import os
 import sys
 
 # Configure logging.
+log_level = logging.getLevelName(config.LOG_LEVEL or 'INFO')
 from logging.config import dictConfig
 dictConfig({
     'version': 1,
@@ -59,10 +61,11 @@ dictConfig({
         'class': 'logging.StreamHandler',
         'stream': 'ext://flask.logging.wsgi_errors_stream',
         'formatter': 'default',
+        'level': log_level,
     }},
     'root': {
-        'level': 'INFO',
         'handlers': ['wsgi'],
+        'level': log_level,
     },
     # Loggers are created also by alembic, flask_migrate, etc. Without this
     # setting, those loggers seem to be ignored.
@@ -76,8 +79,6 @@ app.config["SQLALCHEMY_DATABASE_URI"] = SQLALCHEMY_DATABASE_URI
 app.config["SQLALCHEMY_ENGINE_OPTIONS"] = {'pool_pre_ping': True}
 app.config["SQLALCHEMY_TRACK_MODIFICATIONS"] = SQLALCHEMY_TRACK_MODIFICATIONS
 
-app.logger.setLevel(logging.INFO)
-
 cors = CORS(app)
 
 db.init_app(app)
diff --git a/backend/areas/apps/models.py b/backend/areas/apps/models.py
index e9330ab92bafd1eeb36cd93235f405ce68cceb34..88930330bd7289a552ecfa29136431b674f4dd6e 100644
--- a/backend/areas/apps/models.py
+++ b/backend/areas/apps/models.py
@@ -316,3 +316,17 @@ class OAuthClientApp(db.Model):  # pylint: disable=too-few-public-methods
     def __repr__(self):
         return (f"oauthclient_id: {self.oauthclient_id}, app_id: {self.app_id},"
                 f" app: {self.app}")
+
+class ScimAttribute(db.Model):  # pylint: disable=too-few-public-methods
+    """
+    The ScimAttribute object records that a certain user attribute needs to be
+    set in a certain app via SCIM.
+    """
+
+    user_id = db.Column(String(length=64), primary_key=True)
+    app_id = db.Column(Integer, ForeignKey("app.id"), primary_key=True)
+    attribute = db.Column(String(length=64), primary_key=True)
+
+    def __repr__(self):
+        return (f"attribute: {self.attribute}, user_id: {self.user_id},"
+                f" app_id: {self.app_id}")
diff --git a/backend/areas/users/user_service.py b/backend/areas/users/user_service.py
index cb59124f188ee74bcb92121321475b5b249bd773..a123cab15f3ad5012fdfb26ccd0aa7032a0cad12 100644
--- a/backend/areas/users/user_service.py
+++ b/backend/areas/users/user_service.py
@@ -20,6 +20,7 @@ from areas.apps.apps_service import AppsService
 from areas.roles import Role
 from helpers import KratosApi
 from helpers.error_handler import KratosError
+from helpers.provision import Provision
 from helpers.threads import request_provision
 
 
@@ -123,11 +124,28 @@ class UserService:
 
     @classmethod
     def put_user(cls, id, data):
-        kratos_data = {
-            "schema_id": "default",
-            "traits": {"email": data["email"], "name": data.get("name", "")},
-        }
-        KratosApi.put("/admin/identities/{}".format(id), kratos_data)
+        # Get the old version of the identity. We need that for comparison to
+        # see if some attributes are changed by our update.
+        old_user = KratosApi.get("/admin/identities/{}".format(id)).json()
+        old_name = old_user["traits"].get("name", "")
+        new_name = data.get("name", "")
+        # Create list of patches with our changes.
+        patches = []
+        patches.append(JsonPatch(op="replace", path="/traits/email", value=data['email']))
+        patches.append(JsonPatch(op="replace", path="/traits/name", value=new_name))
+        # Determine whether we're really changing the name, and if so record
+        # that fact in the database in the form of a ScimAttribute. We'll use
+        # that information later during provisioning via SCIM.
+        if old_name != new_name:
+            current_app.logger.info(f"Name changed for: {data['email']}")
+            current_app.logger.info(f"  old name: {old_name}")
+            current_app.logger.info(f"  new name: {new_name}")
+            Provision.store_attribute(attribute='name', user_id=id)
+        # We used a PUT before, but that deletes any attributes that we don't
+        # specify, which is not so convenient. So we PATCH just the attributes
+        # we're changing instead.
+        patch_doc = JsonPatchDocument(value=patches)
+        kratos_identity_api.patch_identity(id, json_patch_document=patch_doc)
 
         if data["app_roles"]:
             app_roles = data["app_roles"]
diff --git a/backend/cliapp/cliapp/cli.py b/backend/cliapp/cliapp/cli.py
index ca93b5e17198d7828ec7785c6cef5736ade3972e..5174e05325264d51af85938ce18abc7a4f6a976d 100644
--- a/backend/cliapp/cliapp/cli.py
+++ b/backend/cliapp/cliapp/cli.py
@@ -319,6 +319,10 @@ def update_user(email, field, value):
     else:
         current_app.logger.error(f"Field not found: {field}")
 
+    # TODO: this currently deletes the last_recovery and last_login because
+    # `save` uses a simple PUT and is not aware of those fields. We should
+    # switch to PATCH instead, or refactor so `save` uses the same code as
+    # `put_user`.
     user.save()
 
 
diff --git a/backend/cluster_config.py b/backend/cluster_config.py
index 4ced17f74f38b6d73d859ade225c8bfaa17214be..7934213f3d32afb9537b553ffc6fc958bb0a006a 100644
--- a/backend/cluster_config.py
+++ b/backend/cluster_config.py
@@ -11,7 +11,7 @@ import helpers.kubernetes as k8s
 # Read in two configmaps from the cluster, which specify which apps should be
 # present in the database. Returns the list of app slugs.
 def populate_apps():
-    logging.info("cluster_config: populating apps")
+    logging.debug("cluster_config: populating apps")
     database_apps = {}
     for app in App.query.all():
         slug = app.slug
@@ -29,7 +29,7 @@ def _populate_apps_from(database_apps, configmap_name):
     slugs = []
     cm_apps = k8s.get_kubernetes_config_map_data(configmap_name, "flux-system")
     if cm_apps is None:
-        logging.info(f"Could not find configmap '{configmap_name}' in namespace 'flux-system'; ignoring.")
+        logging.debug(f"Could not find configmap '{configmap_name}' in namespace 'flux-system'; ignoring.")
     else:
         for app_slug, app_data in cm_apps.items():
             logging.debug(f"configmap app: {app_slug}")
@@ -54,7 +54,7 @@ def _populate_apps_from(database_apps, configmap_name):
 # Read in two configmaps from the cluster, which specify which oauthclients
 # should be present in the database.
 def populate_oauthclients():
-    logging.info("cluster_config: populating oauthclients")
+    logging.debug("cluster_config: populating oauthclients")
     database_oauthclients = {}
     for client in OAuthClientApp.query.all():
         id = client.oauthclient_id
@@ -69,7 +69,7 @@ def populate_oauthclients():
 def _populate_oauthclients_from(database_oauthclients, configmap_name):
     cm_oauthclients = k8s.get_kubernetes_config_map_data(configmap_name, "flux-system")
     if cm_oauthclients is None:
-        logging.info(f"Could not find configmap '{configmap_name}' in namespace 'flux-system'; ignoring.")
+        logging.debug(f"Could not find configmap '{configmap_name}' in namespace 'flux-system'; ignoring.")
     else:
         for client_id, client_app in cm_oauthclients.items():
             logging.debug(f"configmap oauthclient: {client_id}")
@@ -96,9 +96,9 @@ def populate_scim_config(apps):
         secret_name = f"stackspin-scim-{app}"
         scim_config = k8s.get_kubernetes_secret_data(secret_name, "flux-system")
         if scim_config is None:
-            logging.info(f"Could not find secret '{secret_name}' in namespace 'flux-system'; ignoring.")
+            logging.debug(f"Could not find secret '{secret_name}' in namespace 'flux-system'; ignoring.")
             continue
-        logging.info(f"Processing secret stackspin-scim-{app}")
+        logging.debug(f"Processing secret stackspin-scim-{app}")
         app = App.query.filter_by(slug=app).first()
         if not app:
             logging.error(f"  could not find app with slug {app}")
diff --git a/backend/config.py b/backend/config.py
index ffa0967779be7c91f92e8a0909da91d3d0a4435a..2822fb86fd65f8e1736e9c53bb84564c1033f8fb 100644
--- a/backend/config.py
+++ b/backend/config.py
@@ -1,5 +1,7 @@
 import os
 
+LOG_LEVEL = os.environ.get("LOG_LEVEL")
+
 SECRET_KEY = os.environ.get("SECRET_KEY")
 HYDRA_CLIENT_ID = os.environ.get("HYDRA_CLIENT_ID")
 HYDRA_CLIENT_SECRET = os.environ.get("HYDRA_CLIENT_SECRET")
diff --git a/backend/helpers/kratos_user.py b/backend/helpers/kratos_user.py
index 877aaca68ca70376b3245191163bdd9d3544e8b9..34f0527a57382d3bbde8d3daffad46866f551ccd 100644
--- a/backend/helpers/kratos_user.py
+++ b/backend/helpers/kratos_user.py
@@ -2,6 +2,7 @@
 Implement the Kratos model to interact with kratos users
 """
 
+from flask import current_app
 import json
 import re
 import urllib.parse
@@ -12,6 +13,10 @@ from urllib.request import Request
 from ory_kratos_client.model.create_identity_body import CreateIdentityBody
 from ory_kratos_client.model.create_recovery_link_for_identity_body \
     import CreateRecoveryLinkForIdentityBody
+from ory_kratos_client.model.json_patch \
+    import JsonPatch
+from ory_kratos_client.model.json_patch_document \
+    import JsonPatchDocument
 from ory_kratos_client.model.update_identity_body import UpdateIdentityBody
 from ory_kratos_client.rest import ApiException as KratosApiException
 
@@ -33,6 +38,7 @@ class KratosUser():
     state = None
     created_at = None
     updated_at = None
+    metadata_admin = None
 
     def __init__(self, api, uuid = None):
         self.api = api
@@ -55,6 +61,9 @@ class KratosUser():
                     self.state = obj.state
                     self.created_at = obj.created_at
                     self.updated_at = obj.updated_at
+                    self.metadata_admin = obj.metadata_admin
+                    if self.metadata_admin is None:
+                        self.metadata_admin = {}
             except KratosApiException as error:
                 raise BackendError(f"Unable to get entry, kratos replied with: {error}", error) from error
 
@@ -107,6 +116,15 @@ class KratosUser():
             except KratosApiException as error:
                 raise BackendError(f"Unable to save entry, kratos replied with:{error}") from error
 
+    def set_metadata(self, **kwargs):
+        current_app.logger.info(f"Setting metadata for {self.__uuid}:")
+        patches = []
+        for k, v in kwargs.items():
+            current_app.logger.info(f"  {k}={v}")
+            patches.append(JsonPatch(op="replace", path=f"/metadata_admin/{k}", value=v))
+        patch_doc = JsonPatchDocument(value=patches)
+        self.api.patch_identity(self.__uuid, json_patch_document=patch_doc)
+
     def delete(self):
         """Deletes the object from kratos
         :raise: BackendError if Krator API call fails
diff --git a/backend/helpers/kubernetes.py b/backend/helpers/kubernetes.py
index 2c49d6ec1cf7560b18ed727d7e06435d4d4085f4..3aa3afbbd12d8b61a74b99d3324bfdbe0d0cbc49 100644
--- a/backend/helpers/kubernetes.py
+++ b/backend/helpers/kubernetes.py
@@ -67,7 +67,7 @@ def create_variables_secret(app_slug, variables_filepath):
     elif current_secret_data.keys() != new_secret_dict["data"].keys():
         # Update current secret with new keys
         update_secret = True
-        current_app.logger.info(
+        current_app.logger.debug(
             f"Secret {secret_name} in namespace {secret_namespace}"
             " already exists. Merging..."
         )
@@ -75,12 +75,12 @@ def create_variables_secret(app_slug, variables_filepath):
         new_secret_dict["data"] |= current_secret_data
     else:
         # Do Nothing
-        current_app.logger.info(
+        current_app.logger.debug(
             f"Secret {secret_name} in namespace {secret_namespace}"
             " is already in a good state, doing nothing."
         )
         return True
-    current_app.logger.info(
+    current_app.logger.debug(
         f"Storing secret {secret_name} in namespace"
         f" {secret_namespace} in cluster."
     )
@@ -184,9 +184,9 @@ def store_kubernetes_secret(secret_dict, namespace, update=False):
                 namespace=namespace
             )
         except FailToCreateError as ex:
-            current_app.logger.info(f"Secret not created because of exception {ex}")
+            current_app.logger.warning(f"Secret not created because of exception {ex}")
             raise ex
-    current_app.logger.info(f"Secret {verb} with api response: {api_response}")
+    current_app.logger.debug(f"Secret {verb} with api response: {api_response}")
 
 
 def store_kustomization(kustomization_template_filepath, app_slug):
@@ -212,7 +212,7 @@ def store_kustomization(kustomization_template_filepath, app_slug):
             plural="kustomizations",
             body=kustomization_dict)
     except FailToCreateError as ex:
-        current_app.logger.info(
+        current_app.logger.warning(
             f"Could not create {app_slug} Kustomization because of exception {ex}")
         raise ex
     current_app.logger.debug(f"Kustomization created with api response: {api_response}")
@@ -244,7 +244,7 @@ def delete_kustomization(kustomization_name):
             name=kustomization_name,
             body=body)
     except ApiException as ex:
-        current_app.logger.info(
+        current_app.logger.warning(
             f"Could not delete {kustomization_name} Kustomization because of exception {ex}")
         raise ex
     current_app.logger.debug(f"Kustomization deleted with api response: {api_response}")
@@ -453,7 +453,7 @@ def watch_dashboard_config(app, reload):
                     label_selector="stackspin.net/scim-config=1",
                     watch=True
                 ):
-                current_app.logger.info(f"{event['type']} SCIM config secret: {event['object'].metadata.name}")
+                current_app.logger.debug(f"{event['type']} SCIM config secret: {event['object'].metadata.name}")
                 debounced_reload()
     threading.Thread(target=watch_scim_secrets).start()
     def watch_dashboard_configmaps():
@@ -464,7 +464,7 @@ def watch_dashboard_config(app, reload):
                     label_selector="stackspin.net/dashboard-config=1",
                     watch=True
                 ):
-                current_app.logger.info(f"{event['type']} dashboard config configmap: {event['object'].metadata.name}")
+                current_app.logger.debug(f"{event['type']} dashboard config configmap: {event['object'].metadata.name}")
                 debounced_reload()
     threading.Thread(target=watch_dashboard_configmaps).start()
 
diff --git a/backend/helpers/provision.py b/backend/helpers/provision.py
index 4c9c15995395eb06e5a4eaa104bf221a90d31236..41b32edb2968fb3aea67cc3bb652412caaa4935e 100644
--- a/backend/helpers/provision.py
+++ b/backend/helpers/provision.py
@@ -5,8 +5,10 @@ import ory_kratos_client
 from ory_kratos_client.api import identity_api
 import ory_kratos_client.exceptions
 import requests
+from sqlalchemy import exc, select
+from sqlalchemy.sql.expression import literal
 
-from areas.apps.models import App, AppRole, ProvisionStatus
+from areas.apps.models import App, AppRole, ProvisionStatus, ScimAttribute
 from areas.roles.models import Role
 import config
 from database import db
@@ -34,20 +36,20 @@ class Group:
 
     def add_member(self, user):
         if user.scim_id not in self.members:
-            logging.info(f"Adding user to dict: {user.displayName} ({user.scim_id})")
+            logging.debug(f"Adding user to dict: {user.displayName} ({user.scim_id})")
             self.members[user.scim_id] = user
             self.modified = True
 
     def remove_member(self, user):
         if user.scim_id in self.members:
-            logging.info(f"Found user to remove from dict: {user.displayName} ({user.scim_id})")
+            logging.debug(f"Found user to remove from dict: {user.displayName} ({user.scim_id})")
             del self.members[user.scim_id]
             self.modified = True
 
     def debug(self):
-        logging.info(f"Group {self.displayName} ({self.scim_id})")
+        logging.debug(f"Group {self.displayName} ({self.scim_id})")
         for _, member in self.members.items():
-            logging.info(f"  with user {member.displayName} ({member.scim_id})")
+            logging.debug(f"  with user {member.displayName} ({member.scim_id})")
 
 # Read from the database which users need to be provisioned on which apps, and
 # do the corresponding SCIM calls to those apps to do the actual provisioning.
@@ -96,7 +98,7 @@ class Provision:
         for app_id, app in self.scim_apps.items():
             existing_users[app_id] = self._get_existing_users(app)
             for userId, u in existing_users[app_id].items():
-                logging.info(f"Existing user in {app.slug}: {u.displayName} ({userId})")
+                logging.debug(f"Existing user in {app.slug}: {u.displayName} ({userId})")
             if app.scim_group_support:
                 existing_groups[app_id] = self._get_existing_groups(app)
                 for _, g in existing_groups[app_id].items():
@@ -118,7 +120,7 @@ class Provision:
             AppRole.provision_status.in_((ProvisionStatus.SyncNeeded, ProvisionStatus.ToDelete))
         )
         for app_role in app_roles:
-            # logging.info(f"found app_role: {app_role}")
+            logging.debug(f"found app_role: {app_role}")
             # Check if this app supports SCIM at all and is configured for it.
             app_role.last_provision_attempt = datetime.now()
             app = app_role.app
@@ -131,10 +133,10 @@ class Provision:
             # pre-fetched list we got via SCIM.
             existing_user = existing_users[app.id].get(app_role.user_id)
             if existing_user is not None:
-                logging.info(f"User {app_role.user_id} already exists in the app {app.slug}.")
+                logging.debug(f"User {app_role.user_id} already exists in the app {app.slug}.")
             if app_role.role_id == Role.NO_ACCESS_ROLE_ID:
                 if existing_user is None:
-                    logging.info(f"User without access does not exist yet in {app.slug}, so nothing to do.")
+                    logging.debug(f"User without access does not exist yet in {app.slug}, so nothing to do.")
                     # We have not provisioned this user in this app yet, so we
                     # don't have to do anything at this point.
                     app_role.provision_status = ProvisionStatus.Provisioned
@@ -142,7 +144,7 @@ class Provision:
                     db.session.commit()
                     continue
                 else:
-                    logging.info(f"User without access exists in the app {app.slug}; we continue so we can disable the user in the app.")
+                    logging.debug(f"User without access exists in the app {app.slug}; we continue so we can disable the user in the app.")
             try:
                 self._provision_user(app_role, app, existing_user, admin_group.get(app.id))
             except ProvisionError as ex:
@@ -152,11 +154,11 @@ class Provision:
         for app_id, app in self.scim_apps.items():
             if app.scim_group_support:
                 if admin_group[app_id].modified:
-                    logging.info(f"Admin group for {app.slug} was modified, so updating it via SCIM.")
+                    logging.debug(f"Admin group for {app.slug} was modified, so updating it via SCIM.")
                     admin_group[app_id].debug()
                     self._provision_group(admin_group[app_id], app)
                 else:
-                    logging.info(f"Admin group for {app.slug} was not modified.")
+                    logging.debug(f"Admin group for {app.slug} was not modified.")
 
     # Provision the user via SCIM PUT or POST, based on the user and role
     # information in `app_role`, and on the existing user object in the app
@@ -164,7 +166,7 @@ class Provision:
     # `admin_group` object so we may later add or remove the user to/from the
     # admin group.
     def _provision_user(self, app_role, app, existing_user, admin_group):
-        logging.info(f"Reconciling user {app_role.user_id}")
+        logging.debug(f"Reconciling user {app_role.user_id}")
         app = self.scim_apps[app.id]
         scim_headers = {
             'Authorization': 'Bearer ' + app.scim_token
@@ -175,9 +177,9 @@ class Provision:
                 db.session.commit()
             else:
                 logging.info(f"Deleting user {app_role.user_id} from {app.slug}")
-                url = f"{app.scim_url}Users/{existing_user.scim_id}"
+                url = f"{app.scim_url}/Users/{existing_user.scim_id}"
                 response = requests.delete(url, headers=scim_headers)
-                logging.info(f"SCIM http status: {response.status_code}")
+                logging.debug(f"SCIM http status: {response.status_code}")
                 if response.status_code == 204:
                     db.session.delete(app_role)
                     db.session.commit()
@@ -187,7 +189,7 @@ class Provision:
             return
 
         # Get the related user object
-        logging.info(f"Getting user data from Kratos.")
+        logging.debug(f"Getting user data from Kratos.")
         try:
             kratos_user = KratosUser(self.kratos_identity_api, app_role.user_id)
         except BackendError as e:
@@ -202,7 +204,7 @@ class Provision:
             active = False
         else:
             active = True
-        logging.info(f"Active user: {active}")
+        logging.debug(f"Active user: {active}")
         data = {
             'schemas': ['urn:ietf:params:scim:schemas:core:2.0:User'],
             'externalId': app_role.user_id,
@@ -210,15 +212,37 @@ class Provision:
             # Zulip does not read the `emails` property, instead getting the
             # email from the `userName` property.
             'userName': kratos_user.email,
-            'displayName': kratos_user.name,
             'emails': [{
                 'value': kratos_user.email,
                 'primary': True
             }],
-            'name': {
-                'formatted': kratos_user.name,
-            },
         }
+        # Decide whether to include the displayName in the SCIM data. Usually
+        # we want that, but if this is an existing user, and we think the
+        # displayName as stored in Stackspin has not changed since the last
+        # provisioning run, then we do not set it to prevent overwriting a
+        # displayName the user may have set inside the app, bypassing
+        # Stackspin.
+        name_changed = ScimAttribute.query.filter_by(
+            user_id=app_role.user_id,
+            app_id=app_role.app_id,
+            attribute='name',
+        ).first()
+        logging.debug(f"Name changed: {name_changed}")
+        include_name = existing_user is None or name_changed is not None
+        if include_name:
+            logging.debug(f"Setting name in provisioning request.")
+            data['displayName'] = kratos_user.name
+            data['name'] = {
+                'formatted': kratos_user.name,
+            }
+            # Now clear the `name_changed` attribute so we don't set the name
+            # again -- until it's changed again in Stackspin.
+            Provision.done_attribute(
+                attribute='name',
+                user_id=app_role.user_id,
+                app_id=app_role.app_id,
+            )
 
         # Make some app-specific additions and modifications to the SCIM data.
         if app.slug == 'nextcloud':
@@ -230,7 +254,7 @@ class Provision:
             data['userName'] = f"stackspin-{app_role.user_id}"
         if app.slug == 'zulip':
             # Zulip does not accept an empty formatted name.
-            if kratos_user.name is None or kratos_user.name == '':
+            if include_name and (kratos_user.name is None or kratos_user.name == ''):
                 data['name']['formatted'] = "name not set"
             # Zulip doesn't support SCIM user groups, but we can set the user
             # role as a field on the user object.
@@ -243,18 +267,18 @@ class Provision:
         if existing_user is None:
             url = f"{app.scim_url}/Users"
             response = requests.post(url, headers=scim_headers, json=data)
-            logging.info(f"Post SCIM user: {url} with data: {data} getting status: {response.status_code}")
+            logging.debug(f"Post SCIM user: {url} with data: {data} getting status: {response.status_code}")
         else:
             url = f"{app.scim_url}/Users/{existing_user.scim_id}"
             response = requests.put(url, headers=scim_headers, json=data)
-            logging.info(f"Put SCIM user: {url} with data: {data} getting status: {response.status_code}")
+            logging.debug(f"Put SCIM user: {url} with data: {data} getting status: {response.status_code}")
         try:
             response_json = response.json()
         except json.decoder.JSONDecodeError as e:
             logging.info("SCIM result was not json")
             logging.info(response.content)
             raise ProvisionError("App returned non-json data in SCIM user put/post.")
-        logging.info(f"got: {response_json}")
+        logging.debug(f"got: {response_json}")
         if existing_user is None:
             # Because this is a new user for the app, we should read off its
             # SCIM ID and store that in the Stackspin database.
@@ -263,12 +287,12 @@ class Provision:
         user = User(app_role.user_id, response_json['id'], kratos_user.name)
         if app.scim_group_support:
             if app_role.role_id == Role.ADMIN_ROLE_ID:
-                logging.info(f"Adding user to admin group: {user.displayName} ({user.kratos_id})")
+                logging.debug(f"Adding user to admin group: {user.displayName} ({user.kratos_id})")
                 admin_group.add_member(user)
             else:
-                logging.info(f"Removing user from admin group: {user.displayName} ({user.kratos_id})")
+                logging.debug(f"Removing user from admin group: {user.displayName} ({user.kratos_id})")
                 admin_group.remove_member(user)
-            logging.info("After adding/removing user:")
+            logging.debug("After adding/removing user:")
             admin_group.debug()
 
         app_role.status = ProvisionStatus.Provisioned
@@ -277,7 +301,7 @@ class Provision:
         return
 
     def _scim_list_users(self, app):
-        logging.info(f"Info: Getting list of current users from {app.slug} via SCIM.")
+        logging.debug(f"Getting list of current users from {app.slug} via SCIM.")
         # SCIM prescribes a 1-based index.
         startIndex = 1
         # Get this many items per request. The application might further reduce
@@ -287,12 +311,12 @@ class Provision:
         # Track how many users we've received thus far so we know when to stop.
         running_total = 0
         while True:
-            url = f"{app.scim_url}Users?count={count}&startIndex={startIndex}"
+            url = f"{app.scim_url}/Users?count={count}&startIndex={startIndex}"
             scim_headers = {
                 'Authorization': 'Bearer ' + app.scim_token
             }
             response = requests.get(url, headers=scim_headers)
-            logging.info(f"SCIM http status: {response.status_code}")
+            logging.debug(f"SCIM http status: {response.status_code}")
             try:
                 response_json = response.json()
             except json.decoder.JSONDecodeError as e:
@@ -305,7 +329,7 @@ class Provision:
             running_total = running_total + added
             if running_total == response_json['totalResults'] or added == 0:
                 # We've got them all.
-                logging.info(f"All existing users for {app.slug}: {users}")
+                logging.debug(f"All existing users for {app.slug}: {users}")
                 return users
             else:
                 startIndex = startIndex + added
@@ -318,7 +342,7 @@ class Provision:
         for u in scim_users:
             kratos_id = u.get('externalId')
             if not kratos_id:
-                logging.info(f"Got user without externalId: {u}")
+                logging.debug(f"Got user without externalId: {u}")
                 # Users that were created just-in-time when logging in to the
                 # app will not have `externalId` set, so we attempt to look up
                 # the user from our Stackspin database based on the app ID and
@@ -328,7 +352,7 @@ class Provision:
                     scim_id=u['id']
                 ).first()
                 if app_role is None:
-                    logging.info(f"  SCIM ID {u['id']} not listed in database.")
+                    logging.debug(f"  SCIM ID {u['id']} not listed in database.")
                     # We can't find this app user in our Stackspin database, at
                     # least based on the SCIM ID. It could be that it was
                     # created before the introduction of SCIM, or was created
@@ -350,7 +374,7 @@ class Provision:
                     if kratos_user is None:
                         # This user is not known at all by Stackspin, so
                         # we'll ignore it.
-                        logging.info(f"  SCIM user unknown, ignoring.")
+                        logging.debug(f"  SCIM user unknown, ignoring.")
                         continue
                     # We found the user based on email address. We'll
                     # store the SCIM ID for this user in the Stackspin
@@ -363,7 +387,7 @@ class Provision:
                     if app_role is not None:
                         app_role.scim_id = u['id']
                         db.session.commit()
-                        logging.info(f"  Stored SCIM ID {u['id']} for user {kratos_user.uuid} for app {app.slug}")
+                        logging.debug(f"  Stored SCIM ID {u['id']} for user {kratos_user.uuid} for app {app.slug}")
                     kratos_id = kratos_user.uuid
                 else:
                     kratos_id = app_role.user_id
@@ -371,20 +395,20 @@ class Provision:
         return users
 
     def _get_existing_groups(self, app):
-        logging.info(f"Info: Getting list of current groups from {app.slug} via SCIM.")
+        logging.debug(f"Getting list of current groups from {app.slug} via SCIM.")
         url = f"{app.scim_url}/Groups"
         scim_headers = {
             'Authorization': 'Bearer ' + app.scim_token
         }
         response = requests.get(url, headers=scim_headers)
-        logging.info(f"SCIM http status: {response.status_code}")
+        logging.debug(f"SCIM http status: {response.status_code}")
         try:
             response_json = response.json()
         except json.decoder.JSONDecodeError as e:
             logging.info("SCIM result was not json")
             logging.info(response.content)
             raise ProvisionError("Failed to get existing groups from {app.slug}")
-        logging.info(f"got: {response_json}")
+        logging.debug(f"got: {response_json}")
         groups = {}
         for group in response_json['Resources']:
             members = {}
@@ -395,14 +419,14 @@ class Provision:
         return groups
 
     def _provision_group(self, group, app):
-        logging.info(f"Reconciling group {group.scim_id}")
+        logging.debug(f"Reconciling group {group.scim_id}")
         scim_headers = {
             'Authorization': 'Bearer ' + app.scim_token
         }
         member_data = [
             {'value': member.scim_id, 'display': member.displayName, '$ref': member.ref(app.scim_url)}
             for _, member in group.members.items()]
-        logging.info(f"Will update admin group for {app.slug} with member data {member_data}")
+        logging.debug(f"Will update admin group for {app.slug} with member data {member_data}")
         data = {
             'schemas': ['urn:ietf:params:scim:schemas:core:2.0:Group'],
             'displayName': group.displayName,
@@ -410,11 +434,33 @@ class Provision:
         }
         url = f"{app.scim_url}/Groups/{group.scim_id}"
         response = requests.put(url, headers=scim_headers, json=data)
-        logging.info(f"SCIM http status: {response.status_code}")
+        logging.debug(f"SCIM http status: {response.status_code}")
         try:
             response_json = response.json()
         except json.decoder.JSONDecodeError as e:
             logging.info("SCIM result was not json")
             logging.info(response.content)
             raise ProvisionError("{app.slug} returned non-json data to SCIM group PUT.")
-        logging.info(f"got: {response_json}")
+        logging.debug(f"got: {response_json}")
+
+    @staticmethod
+    def store_attribute(attribute, user_id):
+        select_apps = select(
+            literal(user_id),
+            literal(attribute),
+            App.id
+        ).where(App.scim_url != None)
+        insert = ScimAttribute.__table__.insert().prefix_with('IGNORE').from_select(
+            ['user_id', 'attribute', 'app_id'],
+            select_apps
+        )
+        db.session.execute(insert)
+
+    @staticmethod
+    def done_attribute(attribute, user_id, app_id):
+        logging.debug(f"Deleting ScimAttribute with attribute={attribute} user_id={user_id} app_id={app_id}")
+        db.session.query(ScimAttribute).filter(
+            ScimAttribute.attribute == attribute,
+            ScimAttribute.user_id == user_id,
+            ScimAttribute.app_id == app_id,
+        ).delete()
diff --git a/backend/migrations/versions/9ee5a7d65fa7_scim_app_attributes.py b/backend/migrations/versions/9ee5a7d65fa7_scim_app_attributes.py
new file mode 100644
index 0000000000000000000000000000000000000000..572edc9baff98b2e0509b8e49d6b71f28cc8ddf1
--- /dev/null
+++ b/backend/migrations/versions/9ee5a7d65fa7_scim_app_attributes.py
@@ -0,0 +1,31 @@
+"""Extend SCIM support to include some attributes during provisioning only when
+they are changed, or the user is first created in the app.
+
+Revision ID: 9ee5a7d65fa7
+Revises: 267d280db490
+Create Date: 2024-06-04 15:39:00
+
+"""
+from alembic import op
+import sqlalchemy as sa
+
+# revision identifiers, used by Alembic.
+revision = '9ee5a7d65fa7'
+down_revision = '267d280db490'
+branch_labels = None
+depends_on = None
+
+def upgrade():
+    # An entry in this table records that a certain user attribute needs to be
+    # set in a certain app via SCIM.
+    op.create_table(
+        "scim_attribute",
+        sa.Column("user_id", sa.String(length=64), nullable=False),
+        sa.Column("app_id", sa.Integer(), nullable=False),
+        sa.Column("attribute", sa.String(length=64), nullable=False),
+        sa.PrimaryKeyConstraint("user_id", "app_id", "attribute"),
+        sa.ForeignKeyConstraint(["app_id"],["app.id"]),
+    )
+
+def downgrade():
+    op.drop_table("scim_attribute")
diff --git a/dev.sh b/dev.sh
index 38591317eb5b0cce65b96670ee3a8b7c615ff71f..fdf7d7e8733c75b4d58354d80ab0bdfef5c3f6c8 100755
--- a/dev.sh
+++ b/dev.sh
@@ -103,7 +103,7 @@ runBackend() {
       echo "Stopping any previous intercept for dashboard-backend..."
       telepresence leave dashboard-backend
       echo "Starting new intercept for dashboard-backend..."
-      telepresence intercept dashboard-backend --service=dashboard-backend --port 5000:80 --mount=true --replace --env-file=./backend.env -- env TELEPRESENCE_MODE=native flask run --reload
+      telepresence intercept dashboard-backend --service=dashboard-backend --port 5000:80 --mount=true --replace --env-file=./backend.env -- env TELEPRESENCE_MODE=native FLASK_DEBUG=1 LOG_LEVEL=DEBUG flask run --reload
       deactivate
       popd > /dev/null
       ;;