Skip to main content
Skip table of contents

Configuring Microsoft Entra ID Provisioning with Declaree via SCIM

This document provides comprehensive instructions for configuring Microsoft Entra ID (formerly known as Azure Active Directory) provisioning with Declaree using the SCIM protocol.

Step-by-Step Configuration Guide

Requirements

Before you begin, ensure the following prerequisites are met:

  1. Dedicated Administrative User Account:

    • It is recommended to create a dedicated user account with administrative privileges to configure Microsoft Entra ID provisioning with Declaree.

    • If your organization has multiple entities, this account should be added to the "parent" organization, which will serve as the default for users provisioned through this integration.

  2. Unique Group Names:

    • Ensure that group names are unique across your organization. Non-unique group names may prevent groups from being linked correctly during the synchronization process.

Step 1: Retrieve Necessary Information from Declaree

  1. Log into Declaree:

    • Use an administrator account, preferably the dedicated user account mentioned in the requirements.

  2. Access Account Settings:

    • Navigate to My Account by clicking on your name in the top right corner of the page.

  3. Generate API Key:

    • Go to the Declaree API tab.

    • Click on Generate Key to create the necessary credentials for the integration.

Step 2: Configure Microsoft Entra ID

  1. Log into Microsoft Entra Admin Center:

    • Access the Microsoft Entra admin center.

  2. Search for Entra ID:

    • Perform a search for "Entra ID" and select Microsoft Entra ID from the results.

  3. Navigate to Enterprise Applications:

    • In the left-hand navigation menu, click on Applications and then select Enterprise Applications.

  4. Create a New Application:

    • Click on New Application.

    • If you’ve already set up Single Sign-On (SSO) for Declaree, locate your existing Declaree app and skip to step 8.

  5. Name and Configure the Application:

    • Click on Create your own application.

    • Name your application and select Integrate any other application you don't find in the gallery (Non-gallery).

  6. Provision User Accounts:

    • In the new application, select Provision User Accounts.

    • Click on Get started.

  7. Configure Provisioning Mode:

    • Select Automatic provisioning mode.

    • In the Tenant URL field, enter one of the following:

      • https://app.declaree.com/SCIM/v2/

      • https://app.declaree.de/SCIM/v2/

    • In the Secret Token field, enter the key generated in Step 1.4.

  8. Test and Save Configuration:

    • Click on Test Connection to ensure the setup is correct.

    • Once successful, click on Save.

  9. Edit Provisioning Mappings:

    • If needed, edit the provisioning mappings to ensure the username is correctly mapped to the mail attribute.

  10. Activate Provisioning:

    • Turn provisioning On and click on Save.

Step 3: Sync Users and Groups

  • Add any users and/or groups you wish to sync with Declaree. Ensure that these groups have unique names as per the earlier requirement.

By following these steps, your Microsoft Entra ID will be successfully configured to provision users and groups to Declaree using the SCIM protocol. If you encounter any issues or need further assistance, please consult the Microsoft Entra or Declaree support resources.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.