Authentication

Configuring SCIM with Microsoft Entra ID

1. Configure your IdP

Sign in to portal.azure.com

Select Microsoft Entra ID from the dashboard.

Select Enterprise applications from the Manage section in the menu.

Press the New application button.

Press the Create your own application button.

Enter a descriptive name of the application and ensure Non-gallery is selected, then press Create.

Select Provisioning from the Manage section in the menu, and then Get started.

Set Provisioning mode to automatic. The Admin credentials section will now require a Tenant URL and Secret Token, which will be generated in the next step.

2. Generate SCIM Token

Keep the Entra tab open, and navigate to https://ssoadmin.red-gate.com/settings.

Press the Setup SCIM button and then press Continue to get past the initial screen.

Enter a name for the token and press Generate Token.

Copy out the Tenant URL and Secret Token. The secret token should be considered sensitive and should be revoked if leaked.

3. Finish configuring your IdP

Back in Entra, paste the Tenant URL and Secret Token from step 2 into the Admin credentials section in Entra.

Press Test connection to ensure these credentials are working correctly.

Press Save.

Expand the Mappings section and press Provision Microsoft Entra ID Users.

Scroll down and press the Edit button for externalId.

Change the Source attribute to objectId, then press OK.

Press Save and then Yes.

Click Overview to return to the provisioning screen in Entra.

Press Start provisioning to enable SCIM.

Select Users and groups in the Manage section in the menu. You might need to refresh the page to get this to appear.

Press Add user/group and add the users and groups to be synced from your IdP. We recommend only those who need to access Redgate tools are synced across.




Didn't find what you were looking for?