All Products
Search
Document Center

Identity as a Service:Bind IDaaS to Feishu

Last Updated:Mar 31, 2026

Connect Feishu to IDaaS EIAM as an identity provider to sync your address book and enable single sign-on (SSO) for your organization.

CategoryCapabilities
AccountSync the full Feishu address book to IDaaS EIAM. Scheduled verification is supported.
LogonScan a QR code with Feishu to log on to IDaaS EIAM or any application in it. Initiate SSO from the Feishu workbench to log on to IDaaS EIAM or any application in it.

Prerequisites

Before you begin, make sure you have:

Important

Feishu requires administrator approval before some permissions take effect. Configure all application permissions in Step 1 before proceeding. Without the required permissions, features such as data synchronization will not work.

Connect to Feishu

The connection process has four steps:

  1. Configure application permissions in Feishu

  2. Configure development settings in IDaaS

  3. Select integration scenarios

  4. Map fields

In the Identity Providers menu, click Other Identity Providers > Feishu to start.

image

Step 1: Configure application permissions

1. Create a Feishu application.

  1. Go to the Feishu Open Platform, log on to the developer backend, and create an enterprise self-built application.

    image

  2. After the application is created, you are redirected to the application details page. Click Credentials & Basic Information to get the App ID and App Secret.

    image

2. Enter your App ID and App Secret in IDaaS.

image

3. Grant address book permissions.

On the Feishu application details page, go to Permission Management > Enable Permissions. Under Address Book, grant the following permissions. These query permissions enable data synchronization and user logon.

image
Permission namePermission valueNotes
Read basic information of the address bookcontact:contact.base:readonly
Read user IDscontact:user.employee_id:readonly
Read basic information of departmentscontact:department.base:readonly
Read the organizational structure of departments in the address bookcontact:department.organize:readonlyRequires version release approval before taking effect
Read basic information of userscontact:user.base:readonly
Read the organizational structure of userscontact:user.department:readonlyRequires version release approval before taking effect
Read user email addressescontact:user.email:readonlyOptional. Enable only if you want to sync this field to IDaaS.
Read user mobile numberscontact:user.phone:readonlyOptional. Enable only if you want to sync this field to IDaaS. Requires version release approval before taking effect.
Important

After you submit a release request, Feishu sends a notification to your administrators. An administrator must review the request in the Feishu Admin console.

4. Enable Feishu database permissions.

  1. In Permission Management, click Configure under Accessible Data Range.

    image

  2. Select the required permissions. This scope determines which user and organization data can be synced to IDaaS and used for Feishu logon.

    image

5. Submit in IDaaS.

After completing permission configuration, click Next in IDaaS. IDaaS checks the API and database permissions. If all required permissions are granted, you can proceed.

Step 2: Configure development settings

1. Enter basic information.

  • Display Name: Enter a name for the identity provider.

  • Enterprise ID: Enter your Feishu enterprise ID, which you can get from the Feishu Admin console.

image

2. Configure development information.

This step requires copying values between IDaaS and Feishu. The following table summarizes what to copy and where.

SettingCopy fromPaste toPurpose
Redirect URLIDaaSFeishu > Security Settings > Redirect URLProcesses user logon requests
Application homepage URLIDaaSFeishu > Add Application Capabilities > Web Application (desktop and mobile homepage)Enables logon from the Feishu workbench without authentication
IP whitelistIDaaS (view only)Feishu > Application Security Settings > IP Whitelist > Batch ModifyRestricts incoming requests by IP address

Redirect URL

  1. Copy the redirect URL from IDaaS.

    image

  2. On the Feishu application details page, paste the URL into the Redirect URL field under Security Settings, then click Add.

    image

Application homepage

  1. Copy the application homepage URL from IDaaS. Configure this URL in Feishu if you want users to log on to the IDaaS CloudSSO user portal from the Feishu workbench without authentication.

    image

  2. On the Feishu application details page, click Add Application Capabilities and add a Web Application.

    image

  3. Paste the URL into both the desktop and mobile homepage fields.

    image

IP address whitelist

  1. View the egress IP addresses in IDaaS. IDaaS provides two types of network endpoints:

    Endpoint typeDescription
    Shared endpointThe default endpoint shared by all IDaaS instances. Supports Internet access only.
    Dedicated endpointAn endpoint exclusive to your IDaaS instance. Use a dedicated endpoint for data synchronization and delegated authentication with Feishu. For details, see Network endpoints.

    image

  2. Copy the egress IP address list from IDaaS and add it to the IP Whitelist under Application Security Settings in Feishu. Use Batch Modify to enter the list.

    image

Step 3: Select scenarios

Select the features you want to enable.

FeatureDescriptionAdditional setup required
Synchronization targetSelect Alibaba Cloud IDaaS from the dropdown. Address book data from Feishu is imported into this IDaaS node.None
Scheduled synchronizationIDaaS performs a full sync of Feishu data at 00:00 every day. Use a cron expression to customize the time. To synchronize data in real time, you can manually trigger a full synchronization task. A built-in protection mechanism stops the sync if more than 30 accounts or 10 organizations are deleted, to prevent accidental data loss.None
Incremental synchronizationDisabled by default. To enable it, you must first configure event notifications after the connection is established.Configure event notifications after the connection is established (see below).
QR code logonAdds a Feishu QR code logon option to the IDaaS logon page. Users scan the QR code to authenticate. If an application homepage is configured, users can also log on from the Feishu workbench without authentication.None

Field mapping: Use field mapping to specify how IDaaS accounts match Feishu users during sync — for example, matching account names to user IDs. If a match is found, the existing account is updated; otherwise, a new account is created.

Enable incremental synchronization

Incremental synchronization requires event notification configuration. Complete this after the connection is established:

  1. On the Identity providers page, find the Feishu application and click Modify.

  2. In the event configuration section, enter the Encrypt Key and Verification Token. Get these values from Events & Callbacks > Encryption Policy on the Feishu application details page.

    image

    image

  3. On the Feishu application details page, go to Events & Callbacks > Event Configuration. Paste the Request Address from IDaaS into the request URL field. This URL sends events to the developer server.

    image

Step 4: Map fields

Configure field mapping if either of the following applies:

  • You have existing IDaaS data and need to link Feishu members or departments to existing IDaaS accounts or organizations.

  • You want to populate IDaaS account fields with data from specific Feishu member fields — for example, use a Feishu user's name as the IDaaS account display name.

Important

The userid field is the unique identifier for Feishu users and can be modified. Because it is the only primary key IDaaS relies on, modifying userid deletes the corresponding IDaaS account and creates a new one. Modify this field with caution.

Manage Feishu identity providers

After the connection is complete, you are redirected to the Identity Providers menu, where you can manage the identity provider and its features.