Submit a ticket My Tickets
Welcome
Login  Sign up

SCIM Enhancement: Domain Group Assignment Support

PowerDMARC now supports domain group assignment through SCIM (System for Cross-domain Identity Management). This enhancement allows you to assign users to specific domain groups directly from your identity provider, so that the right users automatically get access to the right domains — without any manual configuration inside the PowerDMARC portal.

What Is Domain Group Assignment?

Domain groups in PowerDMARC are used to organize domains and control which users have access to. With this SCIM enhancement, you can now define a user's domain group membership as part of their identity provider profile. When SCIM syncs the user to PowerDMARC, their domain group assignments are provisioned automatically alongside their account.

This is particularly useful for organizations managing multiple clients or business units, where different users need access to different sets of domains. Instead of managing this manually inside PowerDMARC, your identity provider becomes the single source of truth.

How It Works

The setup involves adding a custom Domain Groups attribute to your identity provider's user profile and mapping it to the corresponding SCIM field in PowerDMARC. Once configured, domain group values are passed through automatically every time a user is provisioned or updated via SCIM.

Domain group names are entered in a comma-separated format — for example: Group1,Group2.

⚠️ Note: Do not include spaces between domain group names and commas. PowerDMARC will not take any action if the domain groups value is empty. To remove all domain groups from a user, set the value to -1.

Prerequisites

  • SCIM must already be enabled and configured for your account. If you haven't set up SCIM yet, refer to the SCIM General User Guide first.
  • You must have admin access to your identity provider (Okta or Microsoft Entra ID).
  • Domain groups must already exist in your PowerDMARC account before assigning users to them.
 Good to know: This feature is supported for both Okta and Microsoft Entra ID (Azure AD). Follow the dedicated setup guide for your identity provider below.

Setup Guides

We have dedicated step-by-step guides for each supported identity provider. Select yours to get started:

  1. SCIM Domain Group Mapping – Okta
  2. SCIM Domain Group Mapping – Azure Entra ID
P
PowerDMARC is the author of this solution article.

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.