IDaaS supports System for Cross-domain Identity Management (SCIM) synchronization. You can use IDaaS to synchronize your existing corporate account data from sources such as DingTalk, Lark, and Active Directory (AD) to Alibaba Cloud RAM. For more information, see Identity providers. This topic uses AD as an example to describe how to synchronize accounts to RAM using the SCIM protocol.
Activate an IDaaS instance
Go to the Alibaba Cloud IDaaS Management Console. Alternatively, in the product and service navigation pane, you can find and click Application Identity Service to go to the management console.
Click Create Instance.
Synchronize AD data to IDaaS
This topic uses AD as an example. When you perform the integration, select the option that applies to your scenario:
To synchronize DingTalk account data to IDaaS, see Attach DingTalk - Inbound.
To synchronize WeCom account data to IDaaS, see Attach WeCom.
To synchronize Lark account data to IDaaS, see Attach Lark.
To synchronize AD accounts to IDaaS, see Attach AD.
To synchronize OpenLDAP accounts to IDaaS, see Attach OpenLDAP.
To synchronize account data from international identity providers such as Okta and Azure to IDaaS, see Attach an OIDC identity provider.
To use AD authentication to log on, make sure that the delegate authentication feature is enabled. For more information, see Use AD/LDAP authentication to log on to a third-party application.
After the synchronization is complete, you can view the synchronized accounts on the Accounts page.
Synchronize data from IDaaS to RAM
After you import your existing account data to IDaaS, you can import the accounts to RAM using the SCIM protocol. For more information about the integration process, see Synchronize accounts to RAM using SCIM.
Step 1: Create and grant permissions to an OAuth application in the RAM console
Create an OAuth application.
Log on to the RAM console.
In the left-side navigation pane, choose .
On the Enterprise Application tab, click Create Application.
On the Create Application page, configure the parameters.
Configure Application Name and Display Name.
Set Application Type to Native Application.
Configure Access Token Validity.
Configure Refresh Token Validity.
Click Create Application.
Grant permissions on the OAuth application.
On the Enterprise Application tab, find the application that you want to manage.
On the OAuth Scope tab, click Add OAuth Scope.
In the Add OAuth Scope panel, select /acs/scim.
Click OK.
Create an application secret for the OAuth application.
Click the Application Secret tab, and then click Create Secret.
In the Create Secret dialog box, view and copy the created application secret and click Close.
ImportantThe application secret (AppSecretValue) is displayed only during creation and cannot be queried. Save the secret at the earliest opportunity.
Step 2: Configure SCIM synchronization in IDaaS
Step 3: Perform synchronization
Click One-click Push. The accounts within the synchronization scope are synchronized to RAM.