Add/Update the objectSID SCIM Attribute in Microsoft Azure AD
- 28 Mar 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
Add/Update the objectSID SCIM Attribute in Microsoft Azure AD
- Updated on 28 Mar 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
Article Summary
Share feedback
Thanks for sharing your feedback!
IMPORTANT
Prior to adding SCIM attributes, you must contact your Axiad Customer Success representative, or our Customer Success team (customer.success@axiad.com), to discuss your organization's integration.
The following instructions are a guide to update the SCIM mapping in Azure Active directory to add the object security identifier (object SID).
Note that this process will start a resynchronization of all users in scope for SCIM. The potential impact would be a delay in any SCIM synchronization tasks for pending user changes, or new users, while the full resynchronization is taking place.
To Add/Update a SCIM Attribute in Microsoft Azure
TIP
We recommend you check Microsoft's official documentation for the most up-to-date procedures.
- Open a browser and navigate to the Azure Portal (https://aka.ms/azad).
- Sign into the Azure AD tenant that has the SCIM connection to your Axiad Cloud environment.
- Click Enterprise applications in the left navigation.
- Search for the Axiad Cloud SCIM application that exists in your Azure AD.TIPThe name of the application is set when it was added to Azure AD. We recommend you search for Axiad.
If there are no results you may have to review each application to determine which one is the SCIM application for your Axiad Cloud environment. - From the search results, select the applicable Axiad Cloud application.
- In the Manage section in the left navigation pane, click Provisioning.
The Provisioning page opens. - At the top of the page, click Edit provisioning.
- Expand the Mappings section.
- Click Provision Azure Active Directory Users.
- Check the Show advanced options box.
The Advanced options display. - Click the Edit attribute list <application name> link.
The attribute displays. - Scroll to the bottom and enter urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:objectSid
- Ensure the Type is set to String.
- Click Save at the top of the page.
A confirmation message displays. - Click Yes to confirm the changes.
- At the bottom of the Attribute list, click Add New Mapping and select the following:
- Source attribute: onpremisessecurityidentifier
- Target attribute: urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:objectSid (as defined in step 12)
- Click Ok.
- Click Save.
A confirmation message displays. - Click Yes to confirm the changes and start a resynchronization of all users.
- When the updates complete, close your browser and notify your Axiad team that the SCIM resynchronization is in process. Axiad will then monitor Axiad user accounts for object SID attribute updates.
Was this article helpful?