Taking advantage of user provisioning was never that easy, this article will explain the process succinctly.
Article outline
Prerequisites
Steps to enable SCIM
You might be also interested in
Prerequisites
Azure AD Premium
Elements added as an application to Active Directory. See this article to configure and setup Elements as an application and SAML for SSO.
an Elements Corporate Management with at least one connected domain
an Elements account which has the right to administer the Corporate Management environment
Steps to enable SCIM
1. Open the list of Enterprise applications in Azure Active Directory and select the Elements application (it will have whatever name was given to it when it was setup).
2. Select the Provisioning menu option
3. Open the Elements Corporate Management application and select the Config page and Provisioning tab. The URL and key required for the following section are displayed.
4. In the Azure AD provisioning page, enter the following
In the Tenant URL field enter the the Base URL from the Elements provisioning page
In the Secret Token field enter the Token value from the Elements provisioning page
Click the Test Connection button to check that Azure AD can connect to Elements
5. Setup the synchronization settings
Turn provisioning on.
6. Assign Users to the Elements application
You might be also interested in
Implementing SSO and User Provisioning - this guide describes how to setup and configure Single Sign On (SSO) and User Provisioning from a variety of Identity Providers
Configuring User Provisioning with OKTA - follow these instructions to learn how to configure user provisioning with OKTA
Configuring SAML for OKTA - follow these instructions to learn how to configure SAML for OKTA
Configuring SAML for Google - follow these instructions to learn how to configure SAML for Google
Configuring SAML for Azure AD - follow these instructions to learn how to configure SAML for Azure AD