Favicon

You are here: Home > Platform > Platform > Platform > SCIM for Azure AD

SCIM Integration with Microsoft Azure AD

Learn how to configure SCIM with Applivery and Microsoft Entra ID for automated user and group provisioning. Streamline identity management!

8 min read

TL;DR

Automate user and group provisioning in Applivery with SCIM and Microsoft Entra ID for streamlined identity management.

Warning

This is a premium feature that may not be available on your current plan. Check availability on the Applivery pricing page.

System for Cross-domain Identity Management (SCIM) is an open standard that automates user and group provisioning across cloud services. Rather than managing users manually inside Applivery, SCIM lets Microsoft Entra ID push user and group information automatically β€” creating, updating, and deactivating users and keeping group memberships in sync without any manual intervention.

When combined with SAML SSO, SCIM handles the provisioning side of identity management. SAML authenticates users when they log in, while SCIM continuously keeps the user directory and group structure in Applivery up to date. Crucially, SCIM group management is fully independent of SAML β€” groups pushed via SCIM exist in Applivery as first-class objects before any user ever logs in, and they don't require any additional group configuration on the SAML side.

Tip

SCIM works on top of an existing SAML SSO integration. If you haven't set that up yet, start with the Single Sign-On with Azure AD guide first.


What SCIM manages in Applivery

SCIM can manage three types of resources in Applivery, each with different provisioning behavior depending on the portal you configure it for.

When SCIM is configured for the Enterprise Store, Applivery can automatically create or remove employee accounts in response to changes in Entra ID. When a user is created in Entra ID you can choose to either do nothing or automatically create them as an employee. When they are deactivated, you can choose to either do nothing or remove them from Applivery.

When SCIM is configured for the Dashboard, Applivery manages Collaborator accounts. When a user is created in Entra ID you can choose to either do nothing or create them as a Collaborator with a default role (Admin, Developer/Editor, or Viewer). When they are deactivated, you can do nothing or remove them as a Collaborator.

The initial role assigned on creation can be overridden by group-based role mapping β€” see Role mapping below.

When SCIM is configured for the MDM Portal, Applivery offers the most granular deactivation options. When a user is created in Entra ID, you can do nothing or create them as an MDM employee. When they are deactivated, you have five options: do nothing, unassign the user from their Devices, change the Policy of their assigned Devices, remove the user, or remove the user and all their associated Devices.


Setting up SCIM

1
Enable SCIM in Applivery

In the Applivery Dashboard, go to your **Workspace Settings from the top dropdown menu, then open Login providers in the left-hand menu. Find the SAML row and click Configure for the portal you want to protect β€” Dashboard, App Store, or MDM Portal. Scroll to the bottom of the SAML configuration screen and click Enable SCIM.

Applivery will generate a Base URL and Bearer Token. Copy both β€” you'll need them when configuring Entra ID. The provisioning behavior options (what happens when a user is created or deactivated) are also available here, specific to the portal you selected.

2
Register an Enterprise Application in Entra ID

In the Microsoft Entra admin center, follow the steps described here to create your new application.

3
Configure the SCIM connection

Inside the newly created application, open the Provisioning section and click Get started. Set the Provisioning Mode to Automatic, then fill in the Admin Credentials:

Field

Value

Tenant URL

The Base URL generated by Applivery.

Secret Token

The Bearer Token generated by Applivery.

provisioning scim

Click Test Connection to verify the credentials are correct, then click Save. If the test fails, double-check that the SCIM endpoint is enabled in Applivery and that the token hasn't been regenerated since you copied it.

4
Configure provisioning scope and activate

After saving the credentials, return to the provisioning settings and set Scope to Sync only assigned users and groups β€” this ensures Entra ID only pushes users and groups that are explicitly assigned to this application, rather than your entire directory. Then toggle Provisioning Status to On.

scope and settings
5
Create users and groups in Entra ID

If the users and groups you want to provision don't exist yet in Entra ID, create them now.

To create a user, go to Users β†’ New user β†’ Create new user, fill in the required fields, and click Review + create. To create a group, go to Groups β†’ New group, give it a name and description, and click Create. Once the group exists, open it, navigate to Members β†’ Add members, search for the users you want to include, and confirm.

If your users and groups already exist in Entra ID, you can skip this step.

6
Assign users and groups to the SCIM application

Entra ID only provisions users and groups that are explicitly assigned to the application. Go to Enterprise applications β†’ your SCIM app β†’ Users and groups, and click Add user/group. Search for and select the groups (or individual users) you want to provision into Applivery, then click Assign.

Once assigned, the next automatic provisioning cycle β€” which typically runs every 40 minutes β€” will sync the selected users and groups to Applivery.

Tip

Assigning groups is generally preferable to assigning individual users. When a group is assigned, all its members are provisioned automatically, and any future membership changes in Entra ID are reflected in Applivery on the next sync cycle.


Provision on demand

Instead of waiting for the scheduled sync cycle, you can push changes to Applivery immediately using Provision on demand. This is especially useful when onboarding new users or testing your provisioning configuration without waiting up to 40 minutes for the next automatic window.

Go to Enterprise applications β†’ your SCIM app β†’ Provisioning β†’ Provision on demand. Search for the user or group you want to sync immediately and select it, then click Provision.

Warning

When provisioning a group on demand, Entra ID requires you to also select the group's individual members explicitly β€” they appear listed under View members only in the selection UI. Simply selecting the group alone is not sufficient for the on-demand flow; the scheduled provisioning cycle handles this automatically.


Role mapping

When SCIM is configured for the Dashboard, you can map Entra ID groups to Applivery Collaborator roles. If a user is being provisioned for the first time β€” meaning they don't yet exist in Applivery β€” their role is determined by the groups they belong to in Entra ID:

Entra ID group name

Applivery role

applivery-admin

Admin

applivery-editor

Developer / Editor

applivery-viewer

Viewer

applivery-unassigned

Unassigned

If a user belongs to more than one of these groups, the highest-privilege role takes precedence. If the user doesn't belong to any of these groups, they are created without a role, and an admin will need to assign one manually.

Note

SAML and SCIM role mapping applies only to App Distribution. Device Management permissions are governed exclusively by Segment permissions.

Key Takeaways

  • SCIM automates user and group provisioning across cloud services.
  • SCIM works in conjunction with SAML SSO for comprehensive identity management.
  • Applivery supports SCIM configuration for Enterprise Store, Dashboard, and MDM Portal.
  • Entra ID groups can be mapped to Applivery collaborator roles.
  • SCIM provisioning behavior can be configured for different Applivery portals.