All Products
Search
Document Center

Identity as a Service:Sync Entra ID via SCIM

Last Updated:Mar 31, 2026

Use the System for Cross-domain Identity Management (SCIM) protocol to automatically sync users and groups from Microsoft Entra ID (formerly Azure Active Directory) to Alibaba Cloud Identity as a Service (IDaaS). Once configured, Entra ID pushes user lifecycle events—provisioning, updates, disabling, and deletion—to IDaaS without manual intervention.

Prerequisites

Before you begin, ensure that you have:

  • Administrator permissions for both Alibaba Cloud IDaaS and Microsoft Entra ID

  • A Microsoft Entra ID tenant

  • An EIAM instance created in Alibaba Cloud IDaaS

Step 1: Get the SCIM credentials from IDaaS

  1. Log on to the Alibaba Cloud IDaaS console. In the left navigation pane, click EIAM. On the IDaaS tab, find your instance and click Console in the Actions column.

  2. In the left navigation pane, choose Application Management > Applications. Find the target application (Standard Protocols or Custom Applications) and open its details page. If you haven't created an application yet, see Create an application.

  3. On the application details page, configure account synchronization settings. For details, see Account synchronization between IDaaS and applications.

    Important

    Enable IDaaS API in the application settings before proceeding. image

  4. On the Provisioning > Synchronize Application to IDaaS tab, copy and save the following credentials—you'll need them in the next step:

    • Bearer Token: Click View next to Bearer Token to reveal and copy the token.

    • SCIM Base URL: Copy the URL shown in the SCIM Base URL field.

Step 2: Configure provisioning in Microsoft Entra ID

Create an enterprise application

  1. Log on to the Azure portal as an administrator.

  2. In the top search bar, search for Microsoft Entra ID and click it in the results.

  3. On the overview page, click Add > Enterprise application. image

  4. On the Browse Microsoft Entra Gallery page, click Create your own application.

  5. Enter an application name, select Integrate any other application you don't find in the gallery (Non-Gallery), and click Create.

Assign users and groups

  1. In the left navigation pane, choose Manage > Users and groups.

  2. Click Add user/group to open the Add Assignment page.

  3. Click Users and groups > None selected. In the panel that appears, select the users and groups to sync, click Select at the bottom, and then click Assign.

Connect to IDaaS

  1. In the left navigation pane, choose Manage > Provisioning to open the Overview (Preview) page.

  2. Click New configuration > Connect your application and set the following parameters:

    ParameterValue
    Authentication methodBearer authentication
    Tenant URLThe SCIM Base URL from Step 1
    Secret TokenThe Bearer Token from Step 1
  3. Click Test connection. If you see a "Connection test for 'xxx' was successful" message in the upper-right corner, the connection is configured correctly.

  4. Click Create.

Configure attribute mappings

  1. In the left navigation pane, choose Manage > Attribute mapping (Preview).

  2. Click Provision Microsoft Entra ID Users to open the Attribute mappings page.

Keep the required basic attributes

In the Attribute Mappings list, delete all rows not shown in the following figure. Click Delete in each row you want to remove.

image

Sync custom attributes (optional)

To sync additional Entra ID fields to IDaaS extended fields, follow the steps below. The example shows how to sync the streetAddress field to an IDaaS extended field called User Address.

Custom SCIM attribute naming pattern

Custom SCIM extension attributes follow this pattern:

urn:ietf:params:scim:schemas:extension:<CustomExtensionName>:2.0:User:<FieldID>

Where:

  • <CustomExtensionName>: The custom namespace identifier configured in your IDaaS application

  • <FieldID>: The field ID you define in IDaaS

Full example: urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:user_address

Add an extended field in IDaaS

  1. In the IDaaS console, choose Account > Field Management > Extended Fields, and click Create Field.

  2. Configure the field:

    SettingDescriptionExample
    Field Display NameName shown on the user information pageUser Address
    Field IDUnique system identifieruser_address
    Field TypeInput type for the fieldInput Box
  3. On the IDaaS application details page, click Provisioning > Synchronize Application to IDaaS > Show Advanced Settings and configure:

    • Custom Field Namespace: urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User

    • Sync Target Field: Select the extended field you created, for example, User Address (user_address)

  4. Click Save.

Add the attribute mapping in Microsoft Entra ID

  1. Below the Attribute Mappings list, click Show advanced options > Edit attribute list for Customappsso.

  2. At the bottom of the Edit Attribute List, add a new attribute:

    • Name: Enter the full custom attribute name using the pattern above, for example: urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:user_address

    • Type: Select a data type compatible with your IDaaS extended field, for example, String

  3. Click Save in the upper-left corner.

  4. Below the Attribute Mappings list, click Add new mapping.

  5. On the Edit attribute page, configure the mapping:

    SettingValue
    Mapping typeDirect
    Source attributeThe Entra ID field to sync, for example, streetAddress
    Target attributeThe custom attribute you added, for example, urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:user_address
  6. Click OK, then click Save in the upper-left corner.

Start syncing users

Entra ID supports two sync modes:

Automatic sync (recommended)

In the left navigation pane, click Overview (Preview), then click Start provisioning. Entra ID syncs automatically every 40 minutes. This interval is fixed and cannot be changed.

On-demand sync

To sync a specific user or group immediately:

  1. In the left navigation pane, click Provision on demand.

  2. In the Select a user or group search box, enter the name of the user or group and select it.

  3. Click Provision at the bottom of the page.

Step 3: Verify the sync results

  1. Log on to the Alibaba Cloud IDaaS console, find your instance, and click Console.

  2. To verify users: In the left navigation pane, choose Account > Accounts and Orgs. Synced users appear in the Account list with Source set to SCIM Import.

  3. To verify groups: In the left navigation pane, choose Account > Group. Synced groups appear in the Group list with Source set to SCIM Import.

  4. To verify extended field values: Click a synced user's Username to open the User Details page. Check the Account Information > Extended Field area for the synced values.

User lifecycle sync behavior

The following table shows how Entra ID user lifecycle events map to IDaaS:

Entra ID eventWhat Entra ID sendsIDaaS result
User disabledactive: false via SCIMUser marked as Disabled
User re-enabledactive: true via SCIMUser status returns to Normal
User removed from app assignmentDisable instructionUser disabled in IDaaS
User deleted from app, moved to Deleted UsersDisable instruction (next sync cycle)User disabled in IDaaS
User permanently deleted from Deleted UsersDelete instruction (next sync cycle)User deleted from IDaaS
Important

Test deletion behavior in a non-production environment before running large-scale delete operations.

FAQ

How do I re-enable a disabled Entra ID user?

  1. Log on to the Azure portal.

  2. In the top search bar, search for Users and click Services > Users.

  3. Find and click the disabled user.

  4. Under Account Status, click Edit, select Account Enabled, and click Save.

The account will be reactivated.