About SCIM Directory Integration with Microsoft Entra ID
SCIM Directory Integration with Microsoft Entra ID in Iru Endpoint allows you to set up SCIM-based user directory synchronization between Microsoft Entra ID and Iru Endpoint, enabling automatic user and group provisioning and deprovisioning.How It Works
The SCIM integration creates a secure connection between Microsoft Entra ID and Iru Endpoint, enabling automatic synchronization of user and group data. When users or groups are added, modified, or removed in Microsoft Entra ID, these changes are automatically reflected in Iru Endpoint through the SCIM protocol.Prerequisites
- Complete the steps outlined in the SCIM Directory Integration support article to set up a new SCIM user directory in your Iru Endpoint tenant. You will need to obtain the SCIM access token and API URL.
- Copy and store the token provided outlined in the SCIM Directory Integration article. Once you click Done, the token will not be visible and will be required in a later step.
- Be sure to review the supported user and group attributes listed in the SCIM Directory Integration.
- Ensure that nested groups are not included with SCIM as Microsoft does not support this functionality.
Creating the SCIM Integration in Microsoft Entra ID
Access Microsoft Entra Admin Center
Navigate to Entra ID
Access Enterprise Apps
View All Applications
Create New Application
Choose Application Type
Name the Application
Select Integration Type
Create Application
Access Provisioning
Create New Configuration
Configure SCIM Connection
Add Secret Token
Test Connection
Create Configuration
Access Provisioning Settings
Configure Mappings
Configure Settings
Set Scope
Enable Provisioning
Save Configuration
Close Settings
Assigning Users and Groups
Access Users and Groups
Add Users and Groups
Select Users and Groups
Choose from List
Select Assignments
Confirm Selection
Complete Assignment
Verify Assignment
Considerations
AD CS Strong Certificate Mapping
When using Active Directory Certificate Services (AD CS), authentication will fail if a certificate can’t be strongly mapped to an Active Directory account. Follow the steps below to enable Strong Certificate Mapping for your directory integration. Access Your SCIM AppOpen Microsoft Entra ID Admin Portal
Navigate to Enterprise Applications
Find SCIM App
Access Provisioning
Open Attribute Mapping
Select User Provisioning
Scroll to Advanced Options
Show Advanced Options
Edit Attribute List
Add Security Identifier
onPremisesSecurityIdentifier, leaving the default type as String.Save Changes
Return to Attribute Mapping
Add New Mapping
Configure Mapping Type
Set Source Attribute
onPremisesSecurityIdentifierSet Target Attribute
onPremisesSecurityIdentifierSave Mapping
onPremisesSecurityIdentifier will show up in your user attributes in Iru Endpoint after the next Entra SCIM sync (every 20-40 minutes).
Syncing
User syncing is one-way, meaning the Microsoft Entra ID SCIM app will send user information to Iru Endpoint only when new information is needed.If a user or group is added to the SCIM app in Microsoft Entra ID after the app was created, a sync will happen every 40 minutes (set by Microsoft Entra ID). If you want the sync to happen sooner, you can stop/start the provisioning in the SCIM app on the Microsoft Entra ID. This will not impact existing users/groups in Iru Endpoint.Removing Users
- If Entra ID sends sets a use to inactive, the user will be set as inactive in your Iru Endpoint tenant.
- If Entra ID deletes a user, the user will be deleted from your Iru Endpoint tenant.
Blueprint Conditional Logic
If you use Assignment Map conditional logic with groups, you must explicitly add each group you want to have provisioned in Iru Endpoint to the SCIM app. Groups will not sync automatically by adding users that happen to be members of the group.Microsoft Device Compliance
If you are using an Entra ID SCIM user directory integration and the Microsoft Device Compliance integration ensure that the user and group attribute mappings for the externalId attribute in your SCIM application map to objectId as listed below. The objectId is used by Iru Endpoint to map user and group resources in Intune.| User Attribute | User Value |
|---|---|
| externalId | objectId |
| Group Attribute | Group Value |
|---|---|
| externalId | objectId |
Access SCIM Application
Open Provisioning
Access Attribute Mapping
Choose User or Group Mapping
Verify External ID Mapping
Update Mapping if Needed
Save Changes
Return to Overview
Restart Provisioning
Pause Provisioning
Start Provisioning