Skip to main content

Azure AD SCIM v2.0

The following guide will walk you through the process of configuring SAML Jackson to use the Azure AD SCIM v2.0 directory provider.


Create Azure Application

Click Azure Active Directory from the Microsoft Azure Portal.

img alt

Click Enterprise Applications from the left navigation menu.

img alt

If your application is already created, choose it from the list and move to the section Enable SCIM Provisioning

If you haven't created your application yet, click New application button.

img alt

From the next screen, click Create your own application, give your application a name and click the Create button.

img alt


Enable Azure SCIM Provisioning

Click Provisioning from the left navigation menu then click Get started.

img alt

Select Automatic from the Provisioning Mode dropdown and enter the following information under Admin Credentials section:

  • Tenant URL
  • Secret Token

Next, click the Test Connection button to test the connection to see if the credentials are correct, then click Save to save the credentials.

img alt

Expand the Mappings section and ensure group and user attribute mappings are enabled for your app. The default mapping should work.

img alt

Expand the Settings section and make the following changes:

  • Select Sycn only assigned users and groups from the Scope dropdown.
  • Confirm the Provisioning Status is set to On.

img alt

At this stage, you've successfully configured the Azure AD SCIM API integration.


Assign Users

From your application, click the Users and groups from the left navigation menu and click Add user/group.

img alt

Select None Selected under the Users.

From the right side of the screen, select the users you want to assign to the app and click the Select button, then click Assign to those users to the app.

img alt