Skip to main content

SCIM User Management Setup

Note: In order for SCIM to work, you will need SSO and JIT enabled on your Pirros firm.

Updated this week

Microsoft Azure AD / Entra ID Setup

Note: You will need Application Administrator permissions to complete these steps

Configure Azure AD Enterprise Application

  1. Navigate to Azure PortalEntra IDEnterprise Applications

  2. Click New Application → Create your own application

  3. Name: Pirros SCIM (or similar)

  4. Select: “Integrate any other application you don't find in the gallery”

  5. Click Create

Configure SAML SSO

  1. Go to Single sign-on → Select SAML

  2. Configure Basic SAML Configuration:

Configure User Provisioning (SCIM)

  1. Go to ProvisioningGet startedProvisioning (in sidebar)

  2. Set Provisioning Mode to Automatic

  3. Admin Credentials:

  1. Click Test Connection to verify.

  2. In the sidebar, navigate to Attribute Mappings, then in Provision Microsoft Entra ID Users (not Groups):

    1. Ensure Enabled is set to Yes

    2. Ensure that Target Object Actions are enabled for Create, Update and Delete

    3. make sure the following fields are mapped correctly:

  • userName → userPrincipalName

  • name.givenName -> givenName

  • name.familyName → surname

  • emails[type eq "work"].value -> mail

  • active → Switch([IsSoftDeleted], , "True", "False", "False", "True")

  1. Navigate to Users and Groups and begin making assignments to the app. Provisioning via Azure happens on a schedule, so it can take up to 45 minutes for these changes to push to Pirros. If you need to provision a user immediately, navigate to Provision on demand


Okta Setup

1. Create Okta Application

  1. Navigate to Okta Admin ConsoleApplicationsCreate App Integration

  2. Select SAML 2.0 → Next

  3. App Name: Pirros SSO (or something similar)

2. Configure SAML Settings

  1. Single sign-on URL: https://<tenant-name>.us.auth0.com/scim/v2/connections/<auth-connection-id> (Copied from Pirros SSO Settings Page)

  2. Audience URI (SP Entity ID): urn:auth0:<tenant-name>:<auth-connection-id> (Copied from Pirros SSO Settings Page)

  3. Name ID format: EmailAddress

  4. Application username: Email

3. Configure SCIM Provisioning

  1. Go to Provisioning tab → Configure API Integration

  2. Check Enable API integration

  3. API Credentials:

  4. Click Test API Credentials

  5. Enable provisioning features:

    • Create Users

    • Update User Attributes

    • Deactivate Users

Did this answer your question?