SCIM Provisioning
Synchronise users from Azure AD to AssetAsyst’s Azure AD B2C Directory
Enterprise Application
To get started, create a custom Enterprise Application. This how-to is a step-by-step guide on how to create and configure your Enterprise Application with the AssetAsyst SCIM service. However, if your familiar with this process the following sections provide confuration information as a reference.
SCIM Service Configuration
Admin Credentials
When editing Admin Credentials for Provisioning, the Tenant URL is:
https://rimmer.assetasyst.com/scim
You can get the Secret Token from the following page:
This page is only accessible as the admin user (see Account Setup)
Mappings
Provision of Azure Active Directory:
- Disable Groups
- Enable Users. Target Object Actions:
- Create
- Update
- Delete
Supported SCIM User attributes
| Name | Type | Mandatory | Azure AD Mapping | Description |
|---|---|---|---|---|
| externalId | string | Yes | objectid | Unique Guid that represents the user. |
| userName | string | Yes | userPrincipalName | Unique name that represents user within Tenant |
| active | boolean | Yes | Switch([IsSoftDeleted], , “False”, “True”, “True”, “False”) | Used to indicate whether the identity is active (true) or should be deprovisioned (false). |
| emails[type eq “work”].value | string | Work email address | ||
| displayName | string | displayName | Display name for the user. | |
| name.givenName | string | givenName | The first name of the user. | |
| name.familyName | string | surname | The last name of the user. | |
| id | string | NA | Unique identifier generated by AssetAsyst SCIM |