Docs/SCIM Provisioning/Azure AD SCIM Setup

Azure AD SCIM Setup

Configure automatic user provisioning from Microsoft Entra ID (Azure AD) to SecureCodingHub using SCIM 2.0.

Prerequisites

  • Azure AD tenant with admin access
  • SecureCodingHub org admin account
  • SSO configured (recommended but not required)

Step 1 — Generate a SCIM Token

1

Log in to SecureCodingHub as Org Admin

2

Go to SettingsSCIM

3

Click Generate Token

4

Copy the token — it is shown only once

Step 2 — Configure Provisioning in Azure AD

1

Go to Azure PortalMicrosoft Entra IDEnterprise Applications

2

Select your SecureCodingHub application (or create one)

3

Go to ProvisioningGet started

4

Provisioning Mode: Automatic

5

Tenant URL: https://api.securecodinghub.com/api/sch/scim/v2

6

Secret Token: paste your SCIM token

7

Click Test Connection — should succeed

8

Save

Step 3 — Configure Attribute Mapping

Ensure the following attributes are mapped correctly in your Azure AD provisioning configuration:

Azure AD AttributeSecureCodingHub SCIM Attribute
userPrincipalNameuserName
mailemails[type eq "work"].value
givenNamename.givenName
surnamename.familyName
Switch([IsSoftDeleted]...)active

Step 4 — Start Provisioning

1

Set provisioning status to On

2

Save

3

Azure AD runs the initial cycle (may take 20–40 minutes)

4

Subsequent cycles run every ~40 minutes

Step 5 — Verify

1

Check SecureCodingHub Users page

2

Review provisioning logs in Azure Portal

Note: Azure AD provisioning runs on a fixed cycle (typically 40 minutes). Changes are not instant.