Skip to content

Commit 7b2cb4f

Browse files
committed
Add release note
1 parent 05dfc12 commit 7b2cb4f

File tree

5 files changed

+55
-14
lines changed

5 files changed

+55
-14
lines changed

blog-service/2025-04-15-manage.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: SCIM Provisioning (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- manage
6+
- saml
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to announce provisioning for Sumo Logic using SCIM (Cross-domain Identity Management). Now you can automatically provision and deprovision users in Sumo Logic from a provider like Microsoft Entra ID, Okta, or OneLogin.
15+
16+
Create an access key using a Sumo Logic service account to provide authentication for the provider to provision users into Sumo Logic.
17+
18+
[Learn more](/docs/manage/security/scim/).

docs/manage/security/scim/about-scim-provisioning.md

Lines changed: 21 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,29 @@ description: Learn about provisioning users into Sumo Logic using SCIM.
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
This article describes the general process for provisioning users into Sumo Logic from SCIM provisioning providers.
10+
You can provision and deprovision users in Sumo Logic using SCIM (System for Cross-domain Identity Management). SCIM provisioning in Sumo Logic uses [SCIM User Management APIs](/docs/api/scim-user/).
1111

12-
SCIM provisioning in Sumo Logic uses the [SCIM User Management APIs](/docs/api/scim-user/).
12+
## Directions for provisioning providers
1313

1414
See the following articles for directions to configure specific provisioning providers:
1515
* [Provision from Microsoft Entra ID](/docs/manage/security/scim/provision-from-microsoft-entra-id/)
1616
* [Provision from Okta](/docs/manage/security/scim/provision-from-okta/)
17-
* [Provision from OneLogin](/docs/manage/security/scim/provision-from-onelogin/)
17+
* [Provision from OneLogin](/docs/manage/security/scim/provision-from-onelogin/)
18+
19+
## Prerequisites
20+
21+
### Create an access key
22+
23+
Before configuring a provisioning provider, you must create an [access key](/docs/manage/security/access-keys/) using a service account. This access key will provide authorization to provision users from the provider into Sumo Logic.
24+
25+
When you create the access key, copy its access ID and access key values. Depending on the provider you configure, you will enter these when you set up provisioning to use one of the following authorization methods:
26+
* Basic authentication
27+
* Username: Access ID
28+
* Password: Access key
29+
* Bearer token<br/>Use [Base64 encoding](https://www.base64encode.org/) to Base64 encode `<access ID>:<access key>`.
30+
31+
### Set up SAML
32+
33+
Depending on the provider you configure, you may need to [set up SAML for single sign-on](/docs/manage/security/saml/set-up-saml/) in the Sumo Logic instance where you will provision users. This will allow connection to Sumo Logic for provisioning. You may need to copy the single sign-on URL (Assertion Consumer URL) and entity ID from your Sumo Logic [SAML configuration](/docs/manage/security/saml/set-up-saml/#review-saml-configuration) to set up provisioning.
34+
35+
<img src={useBaseUrl('img/security/provision-sumo-logic-saml-settings.png')} alt="ACS and entity ID from Sumo Logic" style={{border: '1px solid gray'}} width="800" />

docs/manage/security/scim/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Learn how to provision users into Sumo Logic using SCIM.
66

77
import useBaseUrl from '@docusaurus/useBaseUrl';
88

9-
Learn how to provision users into Sumo Logic using System for Cross-domain Identity Management (SCIM).
9+
Learn how to provision and deprovision users in Sumo Logic using SCIM (System for Cross-domain Identity Management).
1010

1111
This section contains the following articles:
1212

docs/manage/security/scim/provision-from-microsoft-entra-id.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,19 +73,24 @@ When you [configure SAML in Sumo Logic](/docs/manage/security/saml/integrate-sum
7373
* roles[primary eq "True"].value
7474
1. Click **Save**.<br/><img src={useBaseUrl('img/security/provision-azure-attribute-mappings.png')} alt="Attribute mappings" style={{border: '1px solid gray'}} width="600" />
7575
1. Click the **Home > `<app name>` | Provisioning** link in the top left corner of the screen. This returns you to the **Provisioning** tab.
76-
1. For **Provisioning Status** select **On** to enable provisioning.
77-
1. Click **Save**.<br/><img src={useBaseUrl('img/security/provision-azure-provisioning-status.png')} alt="Provisioning status" style={{border: '1px solid gray'}} width="600" />
7876

7977
### Step 5: Test provisioning
8078

81-
1. In the app, select **Overview**.
79+
1. In the app, select **Manage > Provisioning**.
80+
1. For **Provisioning Status** select **On** to enable provisioning.
81+
1. Click **Save**.<br/><img src={useBaseUrl('img/security/provision-azure-provisioning-status.png')} alt="Provisioning status" style={{border: '1px solid gray'}} width="600" />
82+
1. Select **Overview**.
8283
1. Select **Provision on demand**.<br/><img src={useBaseUrl('img/security/provision-azure-provision-on-demand.png')} alt="Provision on demand" style={{border: '1px solid gray'}} width="600" />
8384
1. Users assigned the app will be provisioned into Sumo Logic.
8485

8586
As long as the app's provisioning status is on, the app runs auto provisioning every 40 minutes.
8687

88+
:::note
89+
By default, users will be assigned the `User` role in Sumo Logic. (The `User` role must already be set up in Sumo Logic to allow users to be provisioned with that role.)
90+
:::
91+
8792
## Syncing between Microsoft Entra ID and Sumo Logic
8893

89-
When you modify the name, email, or role of a user assigned the app in Microsoft Entra ID, the changes will be synced to the corresponding user in Sumo Logic.
94+
When you modify the name or email of a user assigned the app in Microsoft Entra ID, the changes will be synced to the corresponding user in Sumo Logic.
9095

9196
If you unassign a user from the app in Microsoft Entra ID, the corresponding user is deactivated in Sumo Logic. (If you later try to reassign that same user to the app, it will result in an error in Sumo Logic. You must delete the old user from Sumo Logic first so that the user can be provisioned once again from Microsoft Entra ID.)

docs/manage/security/scim/provision-from-okta.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,6 @@ This article describes how to provision users into Sumo Logic from Okta.
1111

1212
## Prerequisites
1313

14-
### Set up SAML
15-
16-
If it is not already set up, [set up SAML for single sign-on with Okta](/docs/manage/security/saml/integrate-sumo-logic-with-okta/) in the Sumo Logic instance where you will provision users. This will allow connection to Sumo Logic for provisioning. Copy the single sign-on URL (Assertion Consumer URL) and entity ID from your Sumo Logic [SAML configuration](/docs/manage/security/saml/set-up-saml/#review-saml-configuration). You will use them when you set up provisioning.
17-
18-
<img src={useBaseUrl('img/security/provision-sumo-logic-saml-settings.png')} alt="ACS and entity ID from Sumo Logic" style={{border: '1px solid gray'}} width="800" />
19-
2014
### Create an access key
2115

2216
Create an [access key](/docs/manage/security/access-keys/) using a service account. This access key will provide authorization to provision users from Okta into Sumo Logic.
@@ -27,6 +21,12 @@ When you create the access key, copy its access ID and access key values. You wi
2721
* Password: Access key
2822
* Bearer token<br/>Use [Base64 encoding](https://www.base64encode.org/) to Base64 encode `<access ID>:<access key>`.
2923

24+
### Set up SAML
25+
26+
If it is not already set up, [set up SAML for single sign-on with Okta](/docs/manage/security/saml/integrate-sumo-logic-with-okta/) in the Sumo Logic instance where you will provision users. This will allow connection to Sumo Logic for provisioning. Copy the single sign-on URL (Assertion Consumer URL) and entity ID from your Sumo Logic [SAML configuration](/docs/manage/security/saml/set-up-saml/#review-saml-configuration). You will use them when you set up provisioning.
27+
28+
<img src={useBaseUrl('img/security/provision-sumo-logic-saml-settings.png')} alt="ACS and entity ID from Sumo Logic" style={{border: '1px solid gray'}} width="800" />
29+
3030
## Configure provisioning from Okta
3131

3232
### Step 1: Create the app

0 commit comments

Comments
 (0)