![]() Add the custom attributes that you want to use in inSync to create a SCIM mapping for classifying users.Select the following Target Object Actions:.On the Attribute Mapping page, enable Synchronize Azure Active Directory Users to.On the homepage of the Azure Portal, find and select your SCIM app in the All Services > Enterprise Applications section.Custom attributes are only used to evaluate the SCIM mappings that you create in the inSync Management Console. The custom attributes, except the userPrincipalName attribute, that you map in the IdP is not stored in inSync. You can also add or define your custom SCIM attributes that you plan to use in the SCIM mapping to classify the users in inSync. inSync requires only a few mandatory attributes (listed in Step 6 of this article). The Druva SCIM app, created earlier, comes with the default base attributes and values. Map SCIM attributes to Azure AD attributes on the SCIM appĪs an administrator, you can view and edit what user attributes must flow between Azure AD and inSync when user accounts are provisioned or updated. Proceed to configure the Azure AD Mapping and map the SCIM attributes with the Azure AD attributes. Click Test Connection to test and try to connect Azure AD to the inSync SCIM endpoint.Tenant URL: Enter inSync GovCloud End-point URL.Secret Token: Enter the token that you generated on the inSync Management Console for SCIM-based user management.Tenant URL: Enter inSync Cloud End-point URL. ![]() ![]() Under the Admin credentials section, specify the field values as defined below:.On the Provisioning pane, select Provisioning mode as Automatic.On the App Overview page, select Provisioning under Manage on the left pane.On the Azure console, go to All Services > Enterprise Applications section and select your SCIM app.Pre-requisite: Token generated while configuring inSync SCIM.
0 Comments
Leave a Reply. |