Azure AD SCIM Employee Provisioning
1 minute read
Need More Answers?
General
Logging Into myPolicies
Acknowledging a Policy
Downloading My Policy Book
Admin
Traditional User Login Feature
Manage Accounts Using Bulk CSV File Upload
Review Frequency - Document Reviews
Tracking and Reporting
View Document Library
Create and Manage Your Policy Book
Azure AD SCIM Employee Provisioning
Prerequisites
An Azure subscription with a trial or licensed version of Entra ID, Azure AD Premium
SCIM Attributes support by myPolicies
SCIM 2.0 Core Schema
- UserName (required and must be unique)
- ExternalId/External_Id (required and must be unique)
- active
- password
- name
-
- familyName
- givenName
- formatted
- Emails (required and must be unique) (Target Attribute: emails[type eq "primary"].value)
-
- primary: true
- value
- type
- addresses
-
- primary: true
- country
- displayName
SCIM 2.0 Extension Enterprise 1.0
- employeeNumber
- costCenter
- organization
- division
- department
- manager
- displayName
urn:ietf:params:scim:schemas:core:2.0:myp:custom
- countryCode
SCIM Operations Supported
- Create
- Update
- Patch (We accept replace and add but we do not support remove at this time)
- Delete
SCIM Endpoint URL
myPolicies endpoints are tenant specific.
https://<your - tenant>.mypolicies.com/scim/v2
in some setups the /v2 has to be removed. i.e. https://<your-tenant>.mypolicies.com/scim
Authentication Requirements
Our SCIM API requires a Bearer token that is supplied by myPolicies upon request.
Provisioning Limitations
Users are never deleted from myPolicies, accounts are disabled upon a delete request.
Test Account Access
A test tenant can be created upon request.
Please e-mail: support@mypolicies.com