Integration with Azure
To configure Microsoft Entra ID to work with Workbench, SSO must be configured in Workbench via SAML or OIDC. See the SAML Single Sign-On Authentication section or the OpenID Connect Authentication section of this guide for more information. See the Authenticating Users section of this guide for more general information on configuring authentication in Workbench.
Below is an example of how to configure Microsoft Entra ID to use Workbench’s user provisioning SCIM API. Please reference the Integrate your SCIM endpoint with the Microsoft Entra provisioning service section of Microsoft’s documentation for more information on getting started with provisioning and how to configure Microsoft Entra ID to use SCIM for your application.
Microsoft Entra ID does not support the synchronization of passwords to external systems through SCIM. See Azure AD SCIM provisioning - Create User random password - Microsoft Q&A for more information.
Once your application is created in Microsoft Entra, you can configure the Microsoft Entra provisioning service to use Workbench’s SCIM API to provision users.
In the application management screen of your application in Microsoft Entra, click on Provisioning in the left panel. The Provisioning blade displays. Once configured, this screen displays the provisioning settings for your application.
Click on Provisioning in the left panel again. The configuration options for provisioning display.
In the Provisioning Mode drop-down, select Automatic. Further configuration options display.
Expand the Admin Credentials section.
Do the following:
- In the Tenant URL field, type the URL of the SCIM API endpoint hosted by your Workbench instance. For example,
https://workbench-hostname>/scim/v2
. - Copy your Workbench SCIM API token and paste it into the Secret Token field. See the Managing tokens section for more information on how to generate this token.
- In the Tenant URL field, type the URL of the SCIM API endpoint hosted by your Workbench instance. For example,
To trigger a test of the connection to Workbench, click Test Connection. If the connection is successful, a similar notification appears:
To save the Admin Credentials configuration, click Save.
Expand the Mappings section and click Provision Azure Active Directory Users. The Attribute Mapping blade displays.
Do the following:
- For the Enabled toggle button, select Yes.
- For the Target Object Actions section, select the following check boxes:
- Create
- Update
- Delete
Scroll to the Attribute Mappings section. Review the attributes that are synchronized from Microsoft Entra ID to your application. Ensure that the
userPrincipalName
attribute from Microsoft Entra ID is mapped to theuserName
attribute in your application.Optionally, scroll to the bottom of the page and select Show advanced options. You can add custom extension attributes supported by Workbench here. See the Adding Workbench attributes to identity providers section for more information.
Click Save to save the attribute mapping.
Return to the previous blade. Click Provision Azure Active Directory Groups.
Provision Azure Active Directory GroupsThe Provision Azure Active Directory Groups option is not supported by Workbench at this time.
Currently, Workbench does not support the Provision Azure Active Directory Groups option. For the Enabled toggle button, select No and click Save.
Return to the previous blade and set the Provisioning Status toggle button to On.
To save the configurtion, click Save.
With provisioning configured successfully, any users that are assigned to the Workbench application are automatically created in Workbench.
Back to top