Configure Microsoft Azure for Provisioning

Prerequisites:  
  • A SCIM federated datasource must be created on the provisioningAgentCredential.value which must reference the userId (for example, "123" for spl-api).

  • The HID Authentication Service server must have a certificate issued with a valid root CA (such as IdenTrust™).

To leverage your Microsoft Azure AD as a SCIM federated repository in HID Authentication Service, you first need to configure the directory for provisioning.

  1. Log on to the Microsoft Azure AD portal (https://aad.portal.azure.com/) and set the Admin Credentials:

    Follow the instructions (starting at step 4) in https://docs.microsoft.com/en-us/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups#integrate-your-scim-endpoint-with-the-aad-scim-client to set the required credentials.

    Graphical user interface, text, application, email  Description automatically generated

    • Tenant URL - the URL of the application's SCIM endpoint

    • Secret Token – the OAuth bearer token (for example, generated by the HID Authentication Service OpenID API Token Endpoint).
  2. Map the directory User attributes to those of the HID Authentication Service deployment as described in https://docs.microsoft.com/en-us/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups#design-your-user-and-group-schema

    The following illustrates a possible attribute mapping:

    Graphical user interface, text, application  Description automatically generated

    Specifically:

    • userPrincipalName is mapped to externalId with the following configuration:
    • Graphical user interface, text, application, email  Description automatically generated

    • To indicate to HID Authentication Service that a new user should be created as a ‘federated’ user, add a new Constant mapping with SCIM_FED as the value and mapped to the userType attribute:
    • Graphical user interface, text, application, email  Description automatically generated

  3. Note: In HID Authentication Service, users will be created in the administration group that is referenced in the datasource adminGroupAssignment.value. See urn:hid:scim:api:idp:2.0:User:Repository.
  4. Map the directory Group attributes to those of the HID Authentication Service deployment as described in https://docs.microsoft.com/en-us/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups#design-your-user-and-group-schema.

    The following illustrates a possible attribute mapping:

    Graphical user interface, text, application, email  Description automatically generated

    Specifically, to indicate to HID Authentication Service that a new group should be created as a ‘federated’ group:

    Graphical user interface, text, application, email  Description automatically generated

  5. Go to the group attribute mapping configuration page, select Show advanced options and then click Edit attribute list for customappsso.

    Graphical user interface, text, application, email  Description automatically generated

  6. Add a custom attribute called urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:Group:groupType and save your changes.

  7. Return to the group attribute configuration page, click Add New Mapping.

    Graphical user interface, text, application, email  Description automatically generated

  8. Create a new Constant mapping with SECURITY_GROUP as the value and mapped to the custom attribute you created in the previous step.

Next step - Configure Microsoft Azure for Authentication