Skip to main content

1ļøāƒ£ How to use the Microsoft Entra SCIM Provisioning Service

This document describes how to configure your Microsoft Entra tenant in order to use it to provision employees and groups on Riot.

Updated this week

ā¶ Activating SCIM on Riot

Connect to your Riot workspace, and go to Settings > Workforce.

There is a section called ā€œSCIM Provisioningā€. Click the ā€œConnectā€ button to get started.

Select ā€œMicrosoftā€ as your identity provider, and click ā€œContinueā€.

As the first step, you will need to connect via SSO with Microsoft.

Click on the ā€œConnectā€ button, and sign-in on Microsoft. You will be redirected back to Riot after the sign-in is complete.

ā· Creating a Microsoft Entra application for SCIM provisioning

Connect to the Microsoft Entra admin center . In the left sidebar, go to Entra ID > Enterprise apps.

Click ā€œNew applicationā€. This will lead you to the Microsoft Entra App Gallery.

Click ā€œCreate your own applicationā€.

In the right panel that just opened, enter ā€œRiot SCIM Provisioningā€. Any name will do, so you can use something else if you prefer. Make sure the option ā€œIntegrate any other application you don't find in the gallery (Non-gallery)ā€ is selected.

Click ā€œCreateā€.

After the application is created, you will be redirected to the application settings.
​

Go to ā€œProvisioningā€.

Click ā€œConnect your applicationā€.

Make sure that ā€œBearer Authenticationā€ is selected for the field ā€œSelect authentication methodā€.

Go to Riot, and copy the ā€œSCIM Endpoint URLā€ into the ā€œTenant URLā€ field in Microsoft Entra.

Click ā€œGenerate Bearer Tokenā€ on Riot, and copy the value into the ā€œSecret Tokenā€ field in Microsoft Entra.

Click ā€œTest Connectionā€. A toast notification should appear and tell you the test was successful.
​

You can now click ā€œCreateā€.
​
​

āø Configuring the provisioning of groups

Go to ā€œAttribute Mappingā€.
​

The default configuration is to allow provisioning of Groups. If you do not want Microsoft Entra to create groups in Riot, click ā€œProvision Microsoft Entra ID Groupsā€ and in the following screen, make sure to switch the ā€œEnabledā€ option to ā€œNo" and click ā€œSaveā€.

The recommended Attribute Mappings for groups is the default configuration, as illustrated in the following screenshot :
​

ā¹ Configuring the provisioning of employees

Go to ā€œAttribute Mappingā€ one more time, and click ā€œProvision Microsoft Entra ID Usersā€.

As the default configuration of the ā€œAttribute Mappingā€ section results in sending data that the Riot platform cannot actually use, we will need to make the following modifications:

  • displayName: Delete

  • emails[type eq "work"].value:

    • If the ā€œmailā€ attribute is properly filled in your Entra tenant, you can leave as it is

    • If the ā€œmailā€ attribute is not properly filled in your Entra tenant, and you use emails as the userPrincipalName, you can click ā€œEditā€ and select ā€œuserPrincipalNameā€ as the Source Attribute instead.

  • name.formatted: Delete

  • Everything containing ā€œaddresses[type eq "work"]ā€: Delete

  • Everything containing ā€œphoneNumberā€: Delete

  • urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:employeeNumber: Delete

Click ā€œSaveā€ to save the changes made so far.

  • externalId: Edit > Select ā€œobjectIdā€ in the ā€œSource attributeā€ option and click ā€œOKā€

Click ā€œSaveā€.

Click ā€œShow advanced optionsā€, and then ā€œEdit attribute list for customappssoā€, and make the following changes:

  • emails[type eq "work"].value : Click Required

  • name.givenName : Click Required

  • name.familyName : Click Required

The recommended Attribute Mappings are illustrated in the following screenshot:

āŗ Configuring the remaining settings

In the application settings, go to ā€œProvisioningā€ and click ā€œSettingsā€ to reveal some additional settings that might be of interest:

  • Send an email notification when a failure occurs: Enable this if you want to be notified in case of errors during the provisioning, enter your email address, and click ā€œSaveā€.

  • Scope: By default, Entra will provision only assigned users and groups. If you want to provision all users and all groups, you can select this here, and click ā€œSaveā€.

If you kept the Scope on ā€œSync only assigned users and groupsā€, now is the time to assign them.

Go to ā€œUsers and groupsā€ and Click ā€œAdd user/groupā€.

Click ā€œNone Selectedā€ and select some users and/or groups, and click ā€œAssignā€.

ā» Trying the provisioning on a few users

If you want to try on a few users, go to ā€œProvisioning on Demandā€ and search for the users and/or groups you want to provision on demand. If provisioning a group, you will need to pick at most 5 users for the provisioning on demand, and then click ā€œProvisionā€ to see if it works.

ā¼ Start the provisioning

When you are ready, go to ā€œOverviewā€, and click ā€œStart Provisioningā€.

Provisioning happens at fixed hours during the day, every 40 minutes. This means the provisioning will not start immediately, and you will have to wait before the Microsoft Entra Provisioning Service will provision all your users and groups.

Did this answer your question?