This article provides instructions on how to set up SCIM within the Microsoft Entra ID SAML2 and OpenID Connect single sign-on applications.
Prerequisites
|
Step-by-step instructions
Generate the SCIM (Secret) Token
- Ensure the Public API module has been enabled in the Templafy Admin Center.
- Navigate to the Account section.
- In the API Keys tab, click Create key.
- Provide a name to the key and click Next.
- Click Add scope and select scim.
- Click Create.
- Click Copy key for use in step 2 below.
Note
|
Configure SCIM in Microsoft Entra ID
- Open the Templafy OpenID Connect or SAML2 enterprise application in Microsoft Entra ID.
- Navigate to the Provisioning tab.
- Select Automatic in the Provisioning Mode dropdown.
- Under the Admin Credentials section, fill in the
Tenant URL
andSecret token
:- Tenant URL format is - https://[templafytenantid].api.templafy.com/v1/scim/
- The Secret token was generated in step 1 above.
- Click Test connection.
- Once the connection has been established, Save the configuration.
- Return to the main application screen
Assign User or User Groups to the SCIM application
- Navigate to the Users and groups tab.
- Click Add user/group on the top ribbon.
- Select the necessary users/groups and click Assign.
Verify the Attribute Mappings within the SCIM Configuration (SAML2 Only)
ImportantIf end-user |
NoteIf using SAML2 SSO, the attribute mappings in SCIM should be the same as the attributes mapped in single sign-on. This may include additional claims configured in single sign-on (such as custom claims), or mappings that were changed (such as |
- Navigate to the Provisioning tab.
- Click Edit attribute mappings.
- Scroll down to the Mappings section.
- Click on Provision Microsoft Entra ID Users.
- Click on the attribute to re-map and Save the changes.
Test SCIM using Provision on demand
It is important to test SCIM with a user prior to running the initial synchronization to ensure the user is successfully created in Templafy with accurate AD claim data.
In order to use the Provision on demand feature, the user must already be assigned to the application. This feature does not support provisioning of groups, only users.
- In the Provisioning tab., click Provision on demand on the top ribbon.
- Search for and select the desired user.
- Click Provision.
After the user is provisioned, export details are shown along with other useful information about the provision including scoping, matching, and action details.
Enable SCIM
-
In the Provisioning tab, click Start provisioning.
When you start provisioning, all users or groups who are assigned to the application will then be synced into your Templafy tenant. Once the initial sync is finished, you are able to check the Provisioning logs to check the status of the sync (who was synced and who was not synced).
Troubleshooting
If SCIM is not functioning as expected, complete the steps below:
- Check the Provisioning logs to see if updates were skipped or failed.
- Click Restart provisioning to see if updates start to flow into Templafy.
Note
|
Comments
Article is closed for comments.