Skip to content

Commit 61efe69

Browse files
authored
Merge pull request #105627 from ArvindHarinder1/patch-87
Update use-scim-to-provision-users-and-groups.md
2 parents 85c169b + ae5784d commit 61efe69

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -968,6 +968,9 @@ To host the service within Internet Information Services, a developer would buil
968968

969969
Requests from Azure Active Directory include an OAuth 2.0 bearer token. Any service receiving the request should authenticate the issuer as being Azure Active Directory for the expected Azure Active Directory tenant, for access to the Microsoft Graph API service. In the token, the issuer is identified by an iss claim, like "iss":"https://sts.windows.net/cbb1a5ac-f33b-45fa-9bf5-f37db0fed422/". In this example, the base address of the claim value, https://sts.windows.net, identifies Azure Active Directory as the issuer, while the relative address segment, cbb1a5ac-f33b-45fa-9bf5-f37db0fed422, is a unique identifier of the Azure Active Directory tenant for which the token was issued. The audience for the token will be the application template ID for the app in the gallery. The application template ID for all custom apps is 8adf8e6e-67b2-4cf2-a259-e3dc5476c621. The application template ID for each app in the gallery varies. Please contact [email protected] for questions on the application template ID for a gallery application. Each of the applications registered in a single tenant may receive the same `iss` claim with SCIM requests.
970970

971+
> [!NOTE]
972+
> It's ***not*** recommended to leave this field blank and rely on a token generated by Azure AD. This option is primarily available for testing purposes.
973+
971974
Developers using the CLI libraries provided by Microsoft for building a SCIM service can authenticate requests from Azure Active Directory using the Microsoft.Owin.Security.ActiveDirectory package by following these steps:
972975

973976
First, in a provider, implement the Microsoft.SystemForCrossDomainIdentityManagement.IProvider.StartupBehavior property by having it return a method to be called whenever the service is started:
@@ -1452,6 +1455,8 @@ Follow the checklist below to ensure that your application is onboarded quicky a
14521455
> [!div class="checklist"]
14531456
> * Support a [SCIM 2.0 ](https://docs.microsoft.com/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups#step-2-understand-the-azure-ad-scim-implementation) user and group endpoint (Only one is required but both are recommended)
14541457
> * Support at least 25 requests per second per tenant (Required)
1458+
> * Establish engineering and support contacts to guide customers post gallery onboarding (Required)
1459+
> * 3 Non-expiring test credentials for your application (Required)
14551460
> * Support the OAuth authorization code grant or a long lived token as described below (Required)
14561461
> * Establish an engineering and support point of contact to support customers post gallery onboarding (Required)
14571462
> * Support updating multiple group memberships with a single PATCH (Recommended)

0 commit comments

Comments
 (0)