Skip to content

Microsoft Entra Scim Sync Readme

Step-by-step guide for configuring Microsoft Entra with DeepIntShield SCIM Sync.

This version matches the current product behavior:

  • one shared DeepIntShield workspace can have many Microsoft Entra connections
  • each connection can belong to a different customer organization
  • login can be routed by email domain, explicit connection selection, or the default connection
  • Microsoft Entra admin access for each customer organization
  • a deployed DeepIntShield URL
  • access to Governance -> SCIM Sync in DeepIntShield

Use one Entra app registration per customer organization.

In DeepIntShield:

  • each Entra app becomes one SCIM Sync connection
  • each connection can be assigned to a customer
  • each connection can optionally define email domains such as acme.com
  • one enabled connection can be marked as the default fallback

If multiple Entra connections exist in one shared workspace:

  • users can be routed by email domain
  • users can choose a connection on the login screen
  • users without a matching domain fall back to the default enabled connection

Repeat this section once per customer organization.

  1. Open Azure Portal.
  2. Go to Microsoft Entra ID -> App registrations.
  3. Click New registration.
  4. Use:
FieldValue
NameDeepIntShield or the customer name
Supported account typesAccounts in this organizational directory only
Redirect URIWeb -> use the Redirect URI shown in DeepIntShield SCIM Sync
  1. Click Register.
  2. Copy:
    • Application (client) ID
    • Directory (tenant) ID

Open the app registration and create these roles:

Display NameValueDescription
AdminadminFull platform access
ViewerviewerRead-only access

Keep the role values lowercase.

  1. Open Certificates & secrets.
  2. Click New client secret.
  3. Create the secret.
  4. Copy the secret Value.

Use the secret value, not the secret ID.

In API permissions, add delegated Microsoft Graph permissions:

  • openid
  • profile
  • email
  • offline_access

Grant admin consent if your tenant requires it.

If Entra groups should map into DeepIntShield teams:

  1. Open Token configuration.
  2. Click Add groups claim.
  3. Select:
    • Security groups, or
    • Groups assigned to the application
  4. Enable both ID and Access token claims.
  1. Open Enterprise applications.
  2. Select the DeepIntShield app.
  3. Go to Users and groups.
  4. Assign users or groups to:
    • Admin
    • Viewer

If a user has multiple roles, DeepIntShield uses the highest privilege role.

  1. Open Governance -> SCIM Sync.
  2. Click New.
  3. Fill one connection for one customer Entra setup.

Use this mapping:

DeepIntShield FieldValue
Connection NameCustomer or organization label
CustomerMatching DeepIntShield customer, or Shared workspace
EnabledOn
DefaultEnable only for the fallback connection
CloudUsually Commercial
Tenant IDEntra Directory (tenant) ID
Client IDEntra Application (client) ID
Client SecretSecret value from Entra
AudienceBlank or Client ID
App ID URIOptional, usually api://{client-id}
Email DomainsCustomer email domains like acme.com, acme.co.uk
User Claimoid
Role Claimroles
Team Claimgroups
Auto ProvisionOn
Groups to TeamsOn if Entra groups should create or map to teams
Deactivate MissingOn if removed users should be deactivated
Refresh TokensOn

Use the Redirect URI, Issuer URL, and Discovery URL shown on the page as the source of truth.

Open the Role Mappings tab and keep these defaults unless your claims differ:

SourceValueDeepIntShield Role
app_roleadminadmin
app_roleviewerviewer

You can also map:

  • group
  • claim

Only admin and viewer are used as DeepIntShield roles in SCIM Sync. If your Entra tenant uses other source values, map them to either admin or viewer.

For each connection:

  1. Click Save.
  2. Click Test.
  3. Fix missing fields if reported.
  4. Click Sync.
  5. Click Refresh if needed.

Open the Linked Users tab for that connection and verify:

  • users are linked to the expected Entra connection
  • the correct customer context is applied
  • roles are resolved correctly
  • teams appear if Groups to Teams is enabled

When multiple Entra connections are enabled in one shared workspace:

  • if the login email matches a configured domain, DeepIntShield routes to that Entra connection
  • if multiple connections are enabled, the login page can show connection selection
  • if no domain matches, the default enabled connection is used
ProblemCheck
AADSTS50011 reply URL mismatchUse the exact Redirect URI shown in SCIM Sync
AADSTS7000215 invalid client secretUse the secret value, not the secret ID
Roles missing in tokenEnsure Entra app roles exist and users or groups are assigned
Groups not syncingEnsure the groups claim is enabled and Groups to Teams is on
Wrong user roleKeep mapped DeepIntShield roles as lowercase admin or viewer
Wrong connection selectedCheck Email Domains and the Default flag
  • SCIM Sync is tenant-scoped, but supports many Entra connections inside one shared workspace
  • each connection can be customer-owned
  • Test validates the saved connection config
  • Sync refreshes DeepIntShield provisioning status for that connection