Configure user and group provisioning with SCIM and Azure AD

Zefort supports SCIM user and group provisioning with Azure AD (and various other SCIM providers).

With these instructions, you can set up SCIM, where users and groups from Azure AD are automatically provisioned to Zefort.

How is SCIM different from SAML?

SAML is mainly used for Single-Sign-On (SSO), while SCIM is only used for user and group provisioning. SAML does provision users in Zefort as they are logged in; this is sometimes called Just-in-Time (JIT) provisioning. With SCIM, users are created almost immediately as they are created by Azure AD, keeping your systems in sync without users needing to log in. SCIM also supports creating groups, which Zeforts SAML integration does not.


You need:

  • To create the integration in Zefort, you need a user with an administrator license and the “Can manager account settings” permission. Also recommended is the “Can manager users and groups” permission to verify the user list.
  • To create this app, you need admin rights in your Azure AD; you need one of the following roles Application Administrator, Cloud Application Administrator, or Global Administrator.

Sidenote: as a best practice, organisations using Zefort often reserve some administrator user accounts for IT personnel, who only have access to configure account settings (and possibly manage user accounts), but no access to actual contracts or other content.


The steps to configure SCIM integration with Azure AD are:

  1. Create a SCIM integration in Zefort
  2. Create an Enterprise application in Azure
  3. Set up provisioning with tenant URL and token from the Zefort integration page
  4. Set up User and Group mapping to match what Zefort supports
  5. Enable provisioning

1. Create a SCIM integration in Zefort

In this step, you create a new SCIM integration object in Zefort.

Sign in to Zefort with your administrator account, and browse to Account settingsIntegrations.

Select “Connect” or “Connect another”  for SCIM.

Select which user type all new users should have under the “Provisioning” section.

Click “Show token”and take note of it, we are going to use it when settings up things in the Azure side.

After that, change the status to “Active” and press the “Save” button.

2. Create an Enterprise application in Azure

In this step, you create an application in your Azure AD tenant configuration to be used for provisioning users and groups.

Microsoft’s instructions guide you through the creation, but in short, do the following:

  1. Log in to the Azure Active Directory portal.
  2. Go to Manage > Enterprise Applications in the left pane, and click + New application to create a new enterprise application.
  3. Click + Create your own application.
  4. Enter a name and select Integrate any other application you don’t find in the gallery (Non-gallery)

You can use this image as a logo:


3. Set up provisioning

  1. Go to the app’s Provisioning section.
  2. Click Get Started.
  3. In the provisioning properties, set the following:
    1. Provisioning Mode: Set to Automatic.
    2. Open the Admin Credentials section and set the Tenant URL to:
    3. Secret Token: Enter the token that we got from the SCIM integration in Zefort
  4. Click Test Connection to test whether the new app can connect to your SCIM API. If there are errors, ensure your tenant URL and secret token are correct and that the integration status is set to “Active” and try again.
  5. Click Save

4. Set up User and Group mapping

Zefort only needs part of the fields that Azure AD can provision; for that reason, we need to configure the user and group mapping to match what Zefort supports.

Attribute mapping can be set by going to the Provisioning page and then clicking Edit attribute mapping. Then open the Mappings section.

We will configure Users and Groups separately. Remember to press Save after making the changes.

(Note that depending on your Azure setup, Users and Groups might be called “Microsoft Entra ID Users” and ” Microsoft Entra ID Groups”)

User Mapping

Azure Attribute / MS Entrada ID Attribute SCIM Attribute / customappsso
userPrincipalName userName
Switch([IsSoftDeleted], , “False”, “True”, “True”, “False”) active
displayName displayName
mailNickname externalId

Group Mapping

Azure Attribute/ MS Entrada ID Attribute SCIM Attribute / customappsso
displayName displayName
objectId externalId
members members

Enable provisioning

Automatic provisioning

If you want to provision all users and groups automatically as they come in, do the following. On the Provisioning page, click the Start provisioning to start syncing users and groups.

On-demand provisioning

If you only want to provision certain users and groups, want to handle the provisioning manually, or want to test out the integration with just a single user or group, then go to the Provisioning page, and click Provision on demand.

Managing user licenses via SCIM

With Zefort SCIM integration admins can maintain Zefort users and user groups in the identity provider. Read more here.

Deleting a user

When you want to delete a user, you first need to remove the user from the IdP. This will change the status of user as inactive. Next you will delete the user profile in Zefort and select who will inherit the contracts, binders etc. of the deleted user.