SCIM Provisioning

Synchronise users from Azure AD to AssetAsyst’s Azure AD B2C Directory

Enterprise Application

To get started, create a custom Enterprise Application. This how-to is a step-by-step guide on how to create and configure your Enterprise Application with the AssetAsyst SCIM service. However, if your familiar with this process the following sections provide confuration information as a reference.

SCIM Service Configuration

Admin Credentials

When editing Admin Credentials for Provisioning, the Tenant URL is:

https://rimmer.assetasyst.com/scim

You can get the Secret Token from the following page:

https://assetasyst.com/scim/token

This page is only accessible as the admin user (see Account Setup)

Mappings

Provision of Azure Active Directory:

  • Disable Groups
  • Enable Users. Target Object Actions:
    • Create
    • Update
    • Delete

Supported SCIM User attributes

Name Type Mandatory Azure AD Mapping Description
externalId string Yes objectid Unique Guid that represents the user.
userName string Yes userPrincipalName Unique name that represents user within Tenant
active boolean Yes Switch([IsSoftDeleted], , “False”, “True”, “True”, “False”) Used to indicate whether the identity is active (true) or should be deprovisioned (false).
emails[type eq “work”].value string   mail Work email address
displayName string   displayName Display name for the user.
name.givenName string   givenName The first name of the user.
name.familyName string   surname The last name of the user.
id string   NA Unique identifier generated by AssetAsyst SCIM

Next: Enterprise Application How-to