Skip to main content
Skip table of contents

SCIM provisioning

SCIM (System for Cross-Domain Identity Management) is a standard protocol that helps automate user management between systems. We added SCIM API endpoints to allow user provisioning and synchronization from external directories.

This guide explains how to connect Microsoft Entra ID (formerly Azure AD) to TrustBuilder using SCIM. It shows how to automatically create, update, and delete user accounts.

Support for other identity providers may be added later.

Refer to Microsoft documentation - Integrate SCIM endpoints with the Microsoft Entra provisioning service to get more information.

Provisioning from Entra ID via SCIM

Microsoft Entra ID will act as the source directory. This means that user data is managed in Entra ID and automatically synchronized with TrustBuilder through SCIM.

As a result, user attributes should not be modified in TrustBuilder. Any changes made there will be overwritten during the next synchronization. Always make updates (such as name, email or status) directly in Entra ID.

✅ Prerequisites

Step 1: Create an Enterprise app in Microsoft

  1. Sign in to the Microsoft Entra admin center.

  2. Browse to Entra ID > Enterprise apps.

  3. A list of all configured apps is shown.

  4. Select + New application > + Create your own application.

    1. Enter a name for your application (e.g: SCIM app)

    2. Choose the option "Integrate any other application you don't find in the gallery (Non-gallery)".

    3. Select Create to create an app.

      image-20250602-130642.png

The new app is added to the list of enterprise applications.

Step 2: Configure the Enterprise app in Microsoft

Once the app is created:

  1. Navigate to Entra ID > Enterprise Apps.

    image-20251001-081704.png
  2. Select your SCIM app.

  3. Go to Provisioning section in the left panel.

    image-20251001-081806.png
  4. Click on + New configuration.

    image-20250602-132917.png
  5. In Admin Credentials:

    image-20260129-144345.png
    1. Enter the Tenant URL to TrustBuilder SCIM endpoint and the Secret token (without “Bearer” prefix). Click on Test connection. If the attempt fails, error information is displayed.

  6. Click on Create if the attempt to connect to the application succeeded.

  7. Go to Attribute mapping in the left panel.

  8. Enable provisioning for users.
    (error) Groups cannot be provisioned yet.

    image-20250602-135726.png
  9. Click on Provision Microsoft Entra ID Users to configure the attributes that are synchronized from Microsoft Entra ID to your app.

  10. Keep the attributes supported by TrustBuilder which are the following:

Customappsso Attribute

Microsoft Entra ID Attribute

Comment

userName

userPrincipalName

Mandatory - Username in TrustBuilder

active

Switch([IsSoftDeleted], , "False", "True", "True", "False")

  • false = blocked

  • true = not blocked

emails[type eq "work"].value

mail

Mandatory if you want to send an enrollment email to users.

E-mail in TrustBuilder

preferredLanguage

preferredLanguage

Optional - Used for email language. Set via Microsoft Graph API only. Default is 'en'.

name.givenName

givenName

Optional - First Name in TrustBuilder

name.familyName

surname

Optional - Last Name in TrustBuilder

phoneNumbers[type eq "mobile"].value

mobilePhone

Optional - Phone in TrustBuilder

Do not delete attributes that are in the table above.

  1. Click on Save.

ENROLLMENT EMAIL

To ensure users receive the enrollment email, configure the enrollment policy with Email as the delivery mode of the enrollment link and make sure Send at creation is enabled.

image-20260109-141424.png

More information

Step 4: Provision users

Group synchronization is not yet supported. Coming in the next release.

In Microsoft Entra admin center:

  1. In the left menu, select Enterprise applications.

  2. Click on your SCIM application.

  3. Go to Provisioning in the left panel then Provisioning.

  4. In Settings, choose the scope: Sync only assigned users and groups.

    image-20250623-100211.png
  5. Click on Save.

  6. Click Users and groups > + Add user/group.

  7. Click on None Selected.

    image-20250603-075010.png
  8. Select the users to provision and click Select.

  9. Click on Assign.

Provisioning occurs every 40 minutes. Once completed, you can verify that users have been created in the TrustBuilder MFA Admin console.

Temporary solution to group synchronization: provisioning using scoping filters

See Microsoft documentation

  1. In Microsoft Entra admin center, in the left menu, select Enterprise applications.

  2. Click on your SCIM application.

  3. Go to Provisioning in the left panel then Provisioning.

  4. In Settings, choose the scope: Sync all users and groups.

    image-20250623-100252.png
  5. Click on Save.

  6. Go to Attribute Mapping (Preview).

  7. Click on Provision Microsoft Entra ID Users.

    image-20250616-131449.png
  8. At Source Object Scope, click on All records.

    image-20250616-131959.png
  9. Click on + Add new filter group.

  10. Define a clause by selecting a source Attribute Name, an Operator and an Attribute Value to match against. See Microsoft documentation

    image-20250624-073638.png
  11. In Scoping Filter Title, add a name for your scoping filter.

  12. Click OK then OK again on the Scoping Filters screen.

  13. Select Save on the Attribute Mapping screen.

Once the filter is applied, only users matching its condition are provisioned into TrustBuilder MFA.

Users out of scope

If a user no longer matches the scoping filter (after a department change for example) they still exist in TrustBuilder but are automatically blocked at the next synchronization.

Provisioning occurs every 40 minutes. Once completed, you can verify that users have been created in the TrustBuilder MFA Admin console.

About deletion

User deletion

Microsoft Entra ID handles user deletion in two steps and TrustBuilder reacts differently to each:

  • Soft-deleted user in Entra:

    • The user is moved to the "Deleted users" section (trash).

    • Their UPN is changed (Object ID + previous UPN, if the UPN is mapped with the login).

    • In TrustBuilder:

      • The user is not deleted.

      • The user is blocked (administratively disabled).

      • The login is updated if UPN is mapped → may cause issues.

  • Hard-deleted user in Entra

    • The user is permanently deleted from Entra.

    • In TrustBuilder, the user is deleted.

Limitations

Group synchronization is not yet supported. See Scoping filters

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.