1. Help Center
  2. Technical / API documentation
  3. Single Sign On for the Learner's Portal

Configuring Auto Provisioning in Microsoft Azure IntraID with SCIM

With SCIM, it is possible to synchronise user information between IntraAD and EdApp. We only support importing users from IntraID into EdApp, we never send back information to IntraID.

Step 1 - Enable SCIM in edApp

  1. Access the integrations page from the admin portal then select SCIM
  2. Select the setup tab to reveal configuration options.
  3. Choose if you want to send welcome emails to users created through SCIM. Note: We recommend leaving this option off unless you use SCIM independent of SSO.
  4.  Choose whether to delete inactive users. Note: Leaving this off will allow you to retain analytics and records for those users while those users will be moved to an inactive group in EdApp
  5. Click Connect to enable the integration

 

Step 2 - Enable SCIM provisioning in Microsoft Azure IntraID

To enable automatic provisioning of users

  • Click the "Test Connection" button to see if the setup is successful.
  • Save the settings.

Step 3 - Configure the mappings between EdApp and Azure IntraID

To setup custom fields, expand the mappings section and click "Provision Active Directory Users".

The next thing to setup is the mappings between the fields in IntraID and EdApp. Click the "Provision Azure Active Directory Users" link.

By default there are a lot of mappings of which most we will not be using. Delete all the mappings that are not needed and only leave the ones as shown below.

  • Save the mappings with the "Save" button at the top.
  • Scroll to the bottom of the page and tick the "Show advanced options" box.
  • Next, click the "Edit attribute list for customappsso" link.
  • In this screen also delete all the fields that are not needed and leave the ones as shown below.
  • Save the fields with the "Save" button at the top.
  • Now, add a new mapping by clicking the "Add New Mapping" link.
  • For the "Source attribute" select "objectId" from the list and for the "Target attribute" select "externalId".
  • Click "Ok" at the bottom of the page.
  • Click "Save" at the top of the page.
  • Custom fields

If you have another identifier in your EntraID system that uniquely identifies a users, you can also use that as the "externalId"

Step 4 - Adding custom fields

With mappings you can also populate custom fields in EdApp.

Assuming that the custom fields have been setup in EdApp, we now need to add them to the "customappsso" by clicking the "Edit attribute list for customappsso" link. In this example we are adding the "department" field.

The name of the attribute needs to have a specific format. "urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:{custom field name}", see example below. Make sure to use the "Field Name" from EdApp, not the "Field Label".

Click Save.

Please note that we only support fields of type "string"

Now we can add the mapping between the EdApp field and the newly added attribute by clicking "Add New Mapping".

In this example we choose the "department" as the "Source attribute" and the newly added attribute as the "Target" attribute.

Click Ok and Save.

When the newly added attribute does not show up in the drop down list, refresh the page as that will refresh the values.

Please note that we only support "direct" mappings