Configuring Microsoft Entra ID Provisioning with Declaree via SCIM
This document provides comprehensive instructions for configuring Microsoft Entra ID (formerly known as Azure Active Directory) provisioning with Declaree using the SCIM protocol.
Step-by-Step Configuration Guide
Requirements
Before you begin, ensure the following prerequisites are met:
Dedicated Administrative User Account:
It is recommended to create a dedicated user account with administrative privileges to configure Microsoft Entra ID provisioning with Declaree.
If your organization has multiple entities, this account should be added to the "parent" organization, which will serve as the default for users provisioned through this integration.
Unique Group Names:
Ensure that group names are unique across your organization. Non-unique group names may prevent groups from being linked correctly during the synchronization process.
Step 1: Retrieve Necessary Information from Declaree
Log into Declaree:
Use an administrator account, preferably the dedicated user account mentioned in the requirements.
Access Account Settings:
Navigate to My Account by clicking on your name in the top right corner of the page.
Generate API Key:
Go to the Declaree API tab.
Click on Generate Key to create the necessary credentials for the integration.
Step 2: Configure Microsoft Entra ID
Log into Microsoft Entra Admin Center:
Access the Microsoft Entra admin center.
Search for Entra ID:
Perform a search for "Entra ID" and select Microsoft Entra ID from the results.
Navigate to Enterprise Applications:
In the left-hand navigation menu, click on Applications and then select Enterprise Applications.
Create a New Application:
Click on New Application.
If you’ve already set up Single Sign-On (SSO) for Declaree, locate your existing Declaree app and skip to step 8.
Name and Configure the Application:
Click on Create your own application.
Name your application and select Integrate any other application you don't find in the gallery (Non-gallery).
Provision User Accounts:
In the new application, select Provision User Accounts.
Click on Get started.
Configure Provisioning Mode:
Select Automatic provisioning mode.
In the Tenant URL field, enter one of the following:
https://app.declaree.com/SCIM/v2/
https://app.declaree.de/SCIM/v2/
In the Secret Token field, enter the key generated in Step 1.4.
Test and Save Configuration:
Click on Test Connection to ensure the setup is correct.
Once successful, click on Save.
Edit Provisioning Mappings:
If needed, edit the provisioning mappings to ensure the username is correctly mapped to the mail attribute.
Activate Provisioning:
Turn provisioning On and click on Save.
Step 3: Sync Users and Groups
Add any users and/or groups you wish to sync with Declaree. Ensure that these groups have unique names as per the earlier requirement.
By following these steps, your Microsoft Entra ID will be successfully configured to provision users and groups to Declaree using the SCIM protocol. If you encounter any issues or need further assistance, please consult the Microsoft Entra or Declaree support resources.