How to configure SCIM for Microsoft Entra ID
To use SCIM-based user provisioning with your Entra ID provider, you need to follow the steps below:
- Configure SCIM in Scaleway.
- Create an Entra ID application.
- Configure the Entra ID application.
- Configure the user mapping.
Before you start
To complete the actions presented below, you must have:
- A Scaleway account logged into the console
- Owner status or IAM permissions allowing you to perform actions in the intended Organization
- The Cloud Application Administrator role in Microsoft Entra ID.
Configure SCIM in Scaleway
-
Click Settings in the upper-right corner of the Organization Dashboard. Alternatively, click the avatar icon in the upper-right corner of the header navigation, then select Settings on the drop-down menu.
-
Click Automatic user provisioning (SCIM), under Organization security, on the left-side navigation.
-
Click Enable. A pop-up displays, informing you that a token creation is required to enable SCIM.
-
Click Enable SCIM and create token. SCIM is now enabled for the Organization. Two fields appear — copy both before continuing:
- SCIM token — used by your Identity Provider to authenticate with Scaleway. Treat this as sensitive and do not share it.
- Base URL — used by your Identity Provider to locate your Scaleway account.
-
Click Close. The configuration is complete on the Scaleway side, but you now need to carry out the SCIM configuration on your Identity provider.
Create an Entra ID application
- Sign in to the Microsoft Entra admin center.
- Go to Enterprise applications and click New Application. Scaleway is not in the Entra app gallery, so you need to create your own application.
- Click Create your own application.
- Enter a name for the application.
- Select the option **Integrate any other application you don't find in the gallery (Non-gallery).
- Click Create.
Configure provisioning in the Entra ID application
- Click Provisioning under the Manage menu. Alternatively, click Provision User Accounts on the application overview page.
- Click Connect your application.
- Enter the following parameters:
- Authentication method: Bearer authentication
- Tenant URL: This is the Base URL value you got when you configured SCIM in Scaleway.
- Bearer token: This is the SCIM token you got when you configured SCIM in Scaleway.
Configure the user mapping in the Entra ID application
Scaleway's SCIM implementation does not support all the default object and attribute values in Microsoft Entra ID. Configure the following parameters.
Disable group provisioning
- Click Attribute mapping under the Manage menu.
- Click Provision Microsoft Entra ID Groups.
- Select No for Enabled, then click Save.
Disable name.formatted
Scaleway does not use a name.formatted field, it constructs the display name by joining the first and last name with a space, identical to Entra's behavior. This mapping is redundant and should be removed.
- Click Attribute mapping under the Manage menu.
- Click Provision Microsoft Entra ID Users. This section controls how Entra ID attributes map to Scaleway SCIM fields.
- Click Delete for
name.formatted.
Simplify generated usernames
By default, Entra generates Scaleway usernames in the format <username>@<domain>.onmicrosoft.com. To keep usernames short and practical, you can add a formatting rule that strips the domain suffix, leaving only <username>.
- In Provision Microsoft Entra ID Users, click Edit for
userName. - Select Expression in Mapping type.
- Enter the following expression:
Item(Split([userPrincipalName], "@"), 1), then click Ok.