This topic describes how to synchronize users or groups in Azure Active Directory (Azure AD) to CloudSSO by using System for Cross-domain Identity Management (SCIM).
Background information
All configuration operations in Azure AD must be performed by an administrator that is assigned global administrative rights. For more information about how to create a user and assign the global administrative rights to the user in Azure AD, see Azure AD documentation.
Step 1: Create SCIM credentials in the CloudSSO console
- Log on to the CloudSSO console.
- In the left-side navigation pane, click Settings.
- In the User Synchronization Configuration section of the Settings page, click Generate SCIM Credential.
- In the SCIM Credential Generated dialog box, copy the generated SCIM credential and click Close.
- Optional:In the User Synchronization Configuration section of the Settings page, click Generate New SCIM Credential to create the second SCIM credential.
Step 2: Enable SCIM synchronization in the CloudSSO console
Log on to the CloudSSO console.
In the left-side navigation pane, click Settings.
In the SCIM-based User Synchronization Configuration section of the Settings page, turn on the switch.
Step 3: Create an application in Azure AD
Log on to the Azure portal as an administrator.
In the upper-left corner of the homepage, click the icon.
In the left-side navigation pane, choose .
On the page that appears, click New application.
On the Browse Azure AD Gallery page, click Create your own application.
In the Create your own application panel, enter a name for your application. In this example, enter CloudSSODemo. Then, select Integrate any other application you don't find in the gallery (Non-gallery) and click Create.
Step 4: Assign users or groups to the application in Azure AD
In the upper-left corner of the Azure AD homepage, click the icon.
In the left-side navigation pane, choose .
In the application list of the page that appears, click CloudSSODemo in the Name column.
In the left-side navigation pane, click Users and groups.
On the page that appears, click Add user/group.
Select users or groups.
Click Assign.
Step 5: Configure SCIM synchronization in Azure AD
In the left-side navigation pane of the CloudSSODemo page, click Provisioning.
On the Provisioning page, click Get started.
On the page that appears, select Automatic for Provisioning Mode.
In the Admin Credentials section, configure the parameters.
Enter the SCIM endpoint for Tenant URL.
To obtain the endpoint, go to the Settings page of the CloudSSO console and copy the value of SCIM Endpoint.
Enter a SCIM credential for Secret Token.
To obtain the credential, perform the operations in Step 1: Create SCIM credentials in the CloudSSO console.
Click Test Connectivity.
After the test succeeds, click Save and go to the next step.
In the Mappings section, configure attribute mappings.
Click Provision Azure Active Directory Users to configure attribute mappings for users.
On the page that appears, find externalId in the customappsso Attribute column and click the value in the Azure Active Directory Attribute column. Then, change the value of Source attribute to objectId.
Retain only the attribute mappings shown in the following figure and delete all other attribute mappings.
Click Provision Azure Active Directory Groups to configure attribute mappings for groups. Retain only the attribute mappings shown in the following figure and delete all other attribute mappings.
NoteThe names of CloudSSO users and groups have requirements on characters. If the name of an Azure AD user or group contains characters that are not supported in the names of CloudSSO users or groups, the mapping fails. To handle the failure, click displayName in the Azure Active Directory Attribute column. Then, set Mapping type to Expression and enter an expression for Expression. The expression that you enter is applied to remove the unsupported characters or replace the unsupported characters with supported characters. For more information, see relevant documentation provided by Azure AD.
In the Settings section, select Sync only assigned users and groups for Scope.
In the Provisioning Status section, turn on the switch.
Click Save.
Go to the Provisioning page, refresh the page, and then view the synchronization results.
Verify the synchronization results
Log on to the CloudSSO console.
Go to the User or Group page to view the synchronized users or groups.
Source for the synchronized users or groups is automatically displayed as SCIM Synchronization.
For more information, see View user information and View the information about a group.