To enable SCIM, you first need an existing application in Microsoft Entra ID. If you haven't created an application yet, please follow these instructions.
After creating the application for the Entra ID SCIM connection, you can take these steps:
Open your portal in Entra ID
In the left pane, expand the Applications menu, then click on the Enterprise Applications menu.
On the page that appears, select All applications, then find and click on the application for which you want to enable provisioning.
Once the application is open, go to the Provisioning menu, then click Connect your application.
When the New provisioning configuration page appears:
In the Tenant URL field, enter the SCIM endpoints base URL you’ve obtained from the SAML Single Sign-On page.
In the Secret Token field, enter the token that you’ve created with the Manage Users with SCIM scope to fill the Secret token field.
Click the Test Connection button.
Once you see the message “Connection test for ‘your_app_name’ was successful,” click the Create button. You will then be redirected to the Provisioning Overview (Preview) page.
Go to the Provisioning menu, then:
Click Mappings.
Select Provision Microsoft Entra ID Groups.
Set Enabled to No.
Click the Save button and confirm by selecting Yes.
Return to the Mappings section and click Provision Microsoft Entra ID Users.
In the Attribute Mappings section, delete all deletable attributes except displayName.
Click the Edit button for the userName record, set all fields as shown in the image below, and then click the OK button.
Click the Add New Mapping link, then add a new mapping for the active field as shown below.
Our final mappings will look something like the one below:
Click the Save button at the top of the page
Now, return to your application's provisioning menu and set the Provisioning Status to On, then click the Save button
Open the Overview (Preview) menu, click Start provisioning, and select Yes to finalize the configuration.
From now on, users who have been assigned to this application will be sent to PowerDMARC.