How to configure SCIM with Azure AD
Enable Azure AD SAML for Single Sign-On in Zeeg with our easy guide on setting up SSO using Microsoft Entra-ID for enhanced user access and security.
Last updated
Enable Azure AD SAML for Single Sign-On in Zeeg with our easy guide on setting up SSO using Microsoft Entra-ID for enhanced user access and security.
Last updated
Zeeg facilitates seamless SCIM provisioning with Azure Active Directory, enabling user creation, updates to user details like names and emails, deactivation, and deletion. These modifications are automatically reflected in Zeeg.
SSO and SCIM can be offered with an Enterprise account. Please contact us to learn more about it.
Requirements
You must have an organization in Zeeg.
You must be either owner or an admin of your organization.
Ensure SAML single sign-on (SSO) setup is complete before initiating SCIM configuration.
During the configuration process, it is recommended to have Zeeg and Azure platforms accessible concurrently in different browser windows for ease of operation.
When SCIM is enabled, you can only add/delete your Zeeg organization users through Azure AD, and not through Zeeg anymore.
From your Zeeg dashboard, select Your Organization.
Go to the SCIM tab. (This tab is only shown when you have enabled SSO)
Click on Enable SCIM; Zeeg will then generate and show a SCIM Secret Token which will be used in the next steps.
Open your Azure portal in a separate tab and browse to Enterprise Applications > All applications.
Find the application you created for Zeeg and click on it.
From the left sidebar, go to Provisioning and then select Get Started.
For Provisioning Mode, select Automatic.
Open the Admin Credentials section in Azure:
Copy the Base URL from your Zeeg SCIM dashboard and paste it into the Tenant URL field.
Copy the SCIM Secret Token from your Zeeg SCIM dashboard and paste it into the Secret Token field.
Click on Test Connection. You should get a successful message from Azure.
Open the Mappings section in Azure:
Zeeg currently does not support Group provisioning; therefore, click on Provision Azure Active Directory Groups. Toggle Enabled to No. Then Save and click on X to return to the main Mappings view.
Click on Provision Azure Active Directory Users. Under Target Object Actions, select Create, Update and Delete.
Under Attribute Mappings, keep the following Azure attributes and delete everything else:
userPrincipalName
Switch([IsSoftDeleted], , "False", "True", "True", "False")
displayName
surname
country
mailNickname
Under Attribute Mappings, select click on each of the following Azure attributes and change the Source attribute accordingly:
mail: change to mail
mailNickname: change to userPrincipalName
The end result of Attribute Mappings should look like below:
Click on Save, then Yes. Finally click on the X at the top right to return to the main Provisioning page.
Open the Settings section in Azure.
If you want to be notified of synchronization issues, select "Send an email notification when a failure occurs" and enter an email address.
For Scope, select Sync only assigned users and groups.
Finally, toggle Provisioning Status to On, and then click on Save.
Note that the provisioning sync is every 40 minutes.
From Enterprise Applications in Azure, select the application you created for SSO with Zeeg.
Under Getting Starter, click on 1. Assign users and groups.
Click on + Add user/group.
Under Users, if ou haven't already assigned any users, you will see None selected; click on that.
In the opened box, search and select your users, and then click on Select; the box will close.
Click on Assign.