Setting up SCIM with Azure Active Directory

Setting up SCIM with Azure Active Directory

Step 2. Set up SAML and enable SCIM in Informatica Intelligent Cloud Services

Step 2. Set up SAML and enable SCIM in
Informatica Intelligent Cloud Services

Set up SAML by uploading the metadata XML file that you generated in Azure AD. Then enable SCIM 2.0 and generate the token for the SCIM provisioning app.
  1. Log in to
    Informatica Intelligent Cloud Services
    as a user with the Admin role.
    If you are setting up SAML for a sub-organization, log in to the sub-organization as a native user with the Admin role. Do not log in to the parent organization and switch to the sub-organization from the parent organization.
  2. In Administrator, open the
    SAML Setup
    page.
  3. In the SSO Configuration area, click
    Choose File
    and upload the metadata XML file to define the identity provider properties.
  4. Enable the
    Map SAML Groups and Roles
    option, and then enable the
    Enable IdP to push users/groups using SCIM 2.0
    option.
    When you enable the
    Enable IdP to push users/groups using SCIM 2.0
    option, auto-provisioning of users is disabled automatically because users are provisioned through the SCIM client.
  5. Click
    Generate Token
    and copy the token to the clipboard.
    You will need the SCIM token when you enable SCIM in the provisioning app. The SCIM token is valid for six months from the time of generation.
  6. Click
    Save
    to save the configuration.
    You will map SAML roles and groups after you create the app roles and groups in Azure AD.

0 COMMENTS

We’d like to hear from you!