SCIM Server (ID Provisioning)
This page provides detailed information on the SCIM Server setup to establish the provisioning with Microsoft Azure AD.
Identity Manager provides an Azure AD provisioning solution based on SCIM. By setting up the SCIM server and provisioning settings correctly, any changes (adding, deleting, and updating) of identities on Azure AD will be reflected in Identity Manager by the frequency set by the users.
Step 1. Enable SCIM Server
Click the SCIM Server tab on the screen, and the SCIM Server page will be displayed.
To enable the SCIM Server, switch the bar to enable, and detailed information about the SCIM server will be displayed.
Step 2. Open the Azure AD Console
Open the Microsoft 365 admin center. Click Show all on the left-side menu first to display all available options. After all items are displayed, click Identity in the Admin centers to bring up the Azure AD Console.
On the left of the Azure AD Console (also called Microsoft Entra admin center), click Applications - Enterprise applications under the Identity category.
Step 3. Add an application for provisioning
Click + New application on the upper part of the Enterprise application screen.
Click Create your own application, and the customized application creation page will be displayed on the right side of the screen. Type in the app's name, select the Integrate any other application you don't find in the gallery (Non-gallery) option, and click Create to finish creating the application. We here use JCV Cloud
as an example. You can change it to any name you want.
It might take some time for the application to be created. Please wait patiently.
Step 4. Apply applications to users and groups
After creating the application, on the overview of the application, click 1. Assign users and groups.
Click Add user/group.
Click None Selected first, type the keyword in the search bar, select the target groups or users, click Select to apply the selection, and click Assign to save.
Step 5. Set Admin credentials
Click Provisioning on the left side of the menu or the Get started button in 3. Provision User Accounts under Getting Started.
Click Get started again in the Overview screen of Provisioning.
Switch the provisioning mode to Automatic
in the dropdown box.
Click Admin Credentials to expand its setting items.
Go to the SCIM server page created in Step 1 on JCV Cloud. Copy the Server endpoint URL from JCV Cloud page and paste it into the Tenant URL textbox on the Azure AD page.
Go to the SCIM server page created in Step 1 on JCV Cloud again. Click the Generate button above Server access token.
About the token expiration time
Due to the technical limitation of the system, the token for provisioning is only available for 10 hours.
To continously generate new available tokens, consider using the OpenAPI endpoint POST /provisioning/token.
Copy and paste the token into the Azure AD page's Secret Token textbox.
To test the connection, click Test Connection. A successful message box will be displayed in the top right area if successful.
Click Save on the top area to finish the Admin Credentials setting.
Step 6. Set Identity Mappings
After the Admin Credentials setting is saved, an extra setting item, "Mappings", will appear on the provisioning setting. This is an essential step, as any incorrect settings will lead to the failure of provisioning the identity data.
Click the tab to expand the setting. There are two auto-generated mappings, Groups
and Users
. The Groups
mapping is ready to use, but the Users
mapping needs further settings. Click the Provision Azure Active Directory Users.
Start with the primary key provisioning. In JCV Cloud Identity Manager, user ID, usually the employee ID, is used as the unique identifier of identities. While in Azure AD, email is set as the userPrincipalName and the primary key. To proceed with the provisioning successfully, ensure the employee ID field is registered on your Azure AD. Click the userPrincipalName line to enter the setting page.
Change the Source attribute value to employeeId and click OK.
Then, change the email mapping. Click the mail and set the Source attribute to userPrincipalName.
Back to the Attribute Mapping page, delete other mapping items until it only includes the following items. Click save to finish the attribute mapping setting.
To verify the mapping setting, you can try the Provision on demand feature and try with a single user in Azure AD.
Step 7. Turn on the provisioning
Back to the overview of the Provisioning of the application, click Start provisioning, and the provisioning will start.
Updated over 1 year ago