About this article
This article is a step-by-step guide on how to send custom claims into Templafy using SCIM.
Sections in this article:
- Open Azure Portal with the Azure AD Connect Schema editor enabled
- Map custom claim attributes to Templafy within SCIM configuration in Templafy enterprise application
- Test new customClaim mappings using on-demand provisioning
- Start provisioning again
Prerequisites
|
Open Azure Portal with the Azure AD Connect Schema editor enabled
Use the below link to open the Azure Portal with the Schema editor enabled. When in the Azure Portal, ensure the URL contains forceSchemaEditorEnabled=true
portal.azure.com/?Microsoft_AAD_Connect_Provisioning_forceSchemaEditorEnabled=true
Map custom claim attributes to Templafy within SCIM configuration in Templafy enterprise application
- Navigate to the Templafy enterprise application where SCIM is configured
- Go to
Provisioning
tab - If SCIM is currently running, click
Stop Provisioning
- Navigate to the User attribute mappings by going to
Edit attribute mappings > Mappings > Provision Azure Active Directory Users
- Scroll down to the bottom of the page and select
Show advanced options
- In advanced options, select
Edit attribute list for Templafy
- If this selection does not appear, make sure you are using the correct URL that includes
forceSchemaEditorEnabled=true
- If this selection does not appear, make sure you are using the correct URL that includes
- At the bottom of the list of attributes, type in 'customClaim1' and leave all other fields empty
- A new empty field will automatically be added to the list below the entry you just made
- Continue adding desired amount of customClaims (up to 15)
- Once all customClaims have been added to this list, Save the configurations at the top of the page
- Once saved, you will be back in the 'Attribute mapping' configurations
- Scroll to the bottom of the page and click
Add New Mapping
- In the
Source attribute
drop down, find the Azure AD attribute you want sent into Templafy - In the
Target attribute
drop down, select corresponding Templafy customClaim (1-15) that you want to use for that Azure AD attribute- This is the customClaim number that you will use to identify this Azure AD attribute within Templafy
- Click
OK
at the bottom of the screen - Continue mapping all applicable Azure AD attributes to customClaims
- Once finished, click
Save
at the top of the screen to save all mappings
Below recording goes from step 5 to 15
Test new customClaim mappings using on-demand provisioning
- Navigate to the main provisioning interface
- On the top navigation bar, select
Provision on demand
- Select a user or several users (Groups are not supported in on-demand provisioning)
- Click
Provision
- Check resulting logs to confirm that the new customClaim mappings successfully sent the Azure AD attribute
- Check the user in the Templafy tenant Admin center to confirm customClaim value is present in Templafy
Start provisioning again
If provisioning was turned off before the attribute mappings were configured, Start provisioning again to continue provisioning users with Templafy
|
Related articles
Comments
0 comments
Article is closed for comments.