Set up a SCIM Provisioning App in Azure Active Directory
This application note will show you how to set up an Azure Active Directory (AD) enterprise app with System for Cross-domain Identity Management (SCIM) provisioning. When done, you will have enabled an enterprise app with provisioning to securely automate and manage user identity information, such as user account creation, updates, and deactivation, between Azure AD and strongDM.
Before You Begin
Ensure that you have the appropriate roles:
- In Azure AD, you must be assigned one of the following roles: Application Administrator, Cloud Application Administrator, or Global Administrator.
- In strongDM, you must be an Account Administrator.
Azure AD SCIM Application Setup Guide
Create an enterprise application
- Log in to the Azure Active Directory portal.
- Go to Manage > Enterprise Applications in the left pane, and click + New application to create a new enterprise application.
- Select + Create your own application.
- Enter a descriptive name for your app, and then select Integrate any other application you don't find in the gallery (Non-gallery) because you’ll be creating your own application instead of using a published gallery app.
Set up provisioning
Go to the app’s Provisioning section.
Click Get Started.
In the provisioning properties, set the following:
- Provisioning Mode: Set to Automatic.
- Tenant URL: Set
- Secret Token: Set the token from the strongDM Admin UI’s Settings > Provisioning section.
In this step, you’re using the HTTP Header authentication method and providing a bearer token to access your SCIM implementation.
The token is generated when provisioning is turned on for your strongDM instance, and it is shown one time only. To enable provisioning, please contact firstname.lastname@example.org.
Click Test Connection to test whether the new app can connect to your SCIM API. If there are errors, make sure your tenant URL and secret token are correct and try again.
Customize user provisioning attribute mappings
- Go back to the app’s Provisioning blade, and expand Mappings to view and edit the User attributes that flow between Azure AD and the target application.
- Edit the User Mappings one by one by deleting all attributes except for the following:
- Edit the Group Mappings in the same way by deleting all attributes except for the following:
- Set Provisioning Status to On.
Manual SCIM provisioning setup is now complete.