Automated User Provisioning: SCIM allows for automated user provisioning, thus limiting setup time per user.
Better user experience: A user can be provisioned by the application manager, before a user has first logged in to the platform. Therefore, correct access rights can be given, allowing a better user experience.
Security: SCIM can help to ensure that user accounts are created and deleted in a timely manner, reducing the risk of unauthorized access to systems and data.
Supported SCIM Operations and Fields
Supported Attributes to map to an echonovum User
Username
The username of the user. This is a required field.
Email address
The email address of the user. This is a required field.
Given Name
The first name of the user. This is a required field.
Family Name
The last name of the user. This is a required field.
Active
The status of the user. This is a required field and defaults to true.
Locale
The locale of the user. This is an optional field and defaults to de.
Setup Provisioning (SCIM) in your Azure enterprise application
Configure the Provision Mode and Admin Credentials
Click on “Provisioning” within the menu in your Enterprise Application on Azure.
Click on “Get started”
Select “Automatic” as Provisioning Mode
With this setting enabled, users will automatically be provisioned every ~45 min by azure.
Input the Admin Credentials (Tenant URL and token)
These are given to you by the echonovum customer success
The tenant url is of the format https://hub.echonovum.com/scim//v2
Test the connection
On success move on to the settings tab
On failure, check the credentials again or get support from the echonovum customer success
Add additional settings within the settings tab by your choosing for
Getting notified on failures
Prevent accidental deletion
Click “Save” and then close the provisioning tab in the top right corner
Configure Attribute Mappings
Click on “Provisioning” in Navigation under “Manage”
Disable Attribute Mapping for Groups (currently no supported)
Click on “Provision Microsoft Entra ID Groups” → Set “Enabled” to “No” → Press “Save” → Close on the top right
Configure Attribute Mapping for Users
Click on “Provision Microsoft Entra ID Users”
Disable “Update” in the Target Object Actions (currently not supported)
Set up the actual attribute mapping as follows Open the image in a new tab to see it in full
First use the delete buttons on the right to delete unnecessary attributes and click save
After that you’ll end up with a list of following attributes