Skip to main content

Entra ID SCIM Setup

This guide provides the steps required to configure provisioning with Superblocks from Microsoft Entra ID (formerly Azure AD).

Features

The following provisioning features are supported when integrating with Entra ID:

  • Create users in Superblocks
  • Remove users in Superblocks when they do not require access anymore
  • Keep user attributes synchronized between Entra and Superblocks
  • Provision groups and group memberships in Superblocks

Prerequisites

The scenarios outlined in this tutorial assumed that you already have the following items:

  • An Entra tenant
  • A user account with permission to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator)
  • A Superblocks organization on the Enterprise plan
  • A user account in Superblocks with Admin permissions

Setup

  1. Sign in to the Microsoft Entra admin center

  2. Navigate to IdentityApplicationsEnterprise applications

  3. Select your Superblocks SSO app or select + New application+ Create your own application

  4. In the app management screen, select Provisioning in the left panel

  5. Set the Provisioning mode to Automatic

  6. Configure credentials as follows:

    FieldValue
    Tenant URLUS: https://app.superblocks.com/scim/v2
    EU: https://eu.superblocks.com/scim/v2
    Secret tokenAccess token with Org Admin privileges
  7. Test the connection and click Save

  8. Optionally, configure user attributes

  9. Turn the Provisioning Status to On

  10. Select the Users and groups tab and assign the users or groups you want to sync

Configure user attributes

Certain user attributes in Entra can by synced to your Superblocks users' profiles.

Supported user attributes

The Superblocks SCIM API currently supports the following attributes:

SCIM User Attribute
Superblocks User Attribute
Description
emailsGlobal.user.emailEmail identifier used to log in to Superblocks.
displayNameGlobal.user.nameThe text shown in Superblocks when referring to the user.
name.givenNameGlobal.user.nameFirst name of the user. Concatenated with name.familyName if displayName is not provided.
name.familyNameGlobal.user.nameLast name of the user. Concatenated with name.givenName if displayName is not provided.
groupsGlobal.user.groupsList of groups to which the user belongs.
activeN/ADisables the user when set to FALSE
roleN/AThe user's organization role. Defaults to null. If not set, the default role for the organization will be used.

Create custom role attribute

All of the supported attributes listed above except for role are supported by default in Entra ID. You can manage a user's organization role via SCIM by configuring a custom attribute in Entra. To do so:

  1. Go to your app's Provisioning page

  2. Expand the Mapping section

  3. Click on the User mapping

  4. Scroll to the bottom of the page and click Show advanced options

  5. Click Edit attribute list for customappsso

  6. Add the following new attribute to the list

    FieldValue
    Nameurn:ietf:params:scim:schemas:extension:enterprise:2.0:User:role
    TypeString
  7. Click Save

  8. Back on the User mapping page, click Add New Mapping

  9. Create a mapping with the Target mapping set to the role attribute just configured

  10. Click Save

success

Now when users are provisioned or attributes updated, their organization role in Superblocks will be set based on the role assigned in Entra.