You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We're excited to announce provisioning for Sumo Logic using SCIM (Cross-domain Identity Management). Now you can automatically provision and deprovision users in Sumo Logic from a provider like Microsoft Entra ID, Okta, or OneLogin.
15
+
16
+
Create an access key using a Sumo Logic service account to provide authentication for the provider to provision users into Sumo Logic.
Copy file name to clipboardExpand all lines: docs/manage/security/scim/about-scim-provisioning.md
+21-3Lines changed: 21 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,11 +7,29 @@ description: Learn about provisioning users into Sumo Logic using SCIM.
7
7
8
8
import useBaseUrl from '@docusaurus/useBaseUrl';
9
9
10
-
This article describes the general process for provisioning users into Sumo Logic from SCIM provisioning providers.
10
+
You can provision and deprovision users in Sumo Logic using SCIM (System for Cross-domain Identity Management). SCIM provisioning in Sumo Logic uses [SCIM User Management APIs](/docs/api/scim-user/).
11
11
12
-
SCIM provisioning in Sumo Logic uses the [SCIM User Management APIs](/docs/api/scim-user/).
12
+
## Directions for provisioning providers
13
13
14
14
See the following articles for directions to configure specific provisioning providers:
15
15
*[Provision from Microsoft Entra ID](/docs/manage/security/scim/provision-from-microsoft-entra-id/)
16
16
*[Provision from Okta](/docs/manage/security/scim/provision-from-okta/)
17
-
*[Provision from OneLogin](/docs/manage/security/scim/provision-from-onelogin/)
17
+
*[Provision from OneLogin](/docs/manage/security/scim/provision-from-onelogin/)
18
+
19
+
## Prerequisites
20
+
21
+
### Create an access key
22
+
23
+
Before configuring a provisioning provider, you must create an [access key](/docs/manage/security/access-keys/) using a service account. This access key will provide authorization to provision users from the provider into Sumo Logic.
24
+
25
+
When you create the access key, copy its access ID and access key values. Depending on the provider you configure, you will enter these when you set up provisioning to use one of the following authorization methods:
Depending on the provider you configure, you may need to [set up SAML for single sign-on](/docs/manage/security/saml/set-up-saml/) in the Sumo Logic instance where you will provision users. This will allow connection to Sumo Logic for provisioning. You may need to copy the single sign-on URL (Assertion Consumer URL) and entity ID from your Sumo Logic [SAML configuration](/docs/manage/security/saml/set-up-saml/#review-saml-configuration) to set up provisioning.
34
+
35
+
<img src={useBaseUrl('img/security/provision-sumo-logic-saml-settings.png')} alt="ACS and entity ID from Sumo Logic" style={{border: '1px solid gray'}} width="800" />
1. Select **Provision on demand**.<br/><img src={useBaseUrl('img/security/provision-azure-provision-on-demand.png')} alt="Provision on demand" style={{border: '1px solid gray'}} width="600" />
83
84
1. Users assigned the app will be provisioned into Sumo Logic.
84
85
85
86
As long as the app's provisioning status is on, the app runs auto provisioning every 40 minutes.
86
87
88
+
:::note
89
+
By default, users will be assigned the `User` role in Sumo Logic. (The `User` role must already be set up in Sumo Logic to allow users to be provisioned with that role.)
90
+
:::
91
+
87
92
## Syncing between Microsoft Entra ID and Sumo Logic
88
93
89
-
When you modify the name, email, or role of a user assigned the app in Microsoft Entra ID, the changes will be synced to the corresponding user in Sumo Logic.
94
+
When you modify the nameor email of a user assigned the app in Microsoft Entra ID, the changes will be synced to the corresponding user in Sumo Logic.
90
95
91
96
If you unassign a user from the app in Microsoft Entra ID, the corresponding user is deactivated in Sumo Logic. (If you later try to reassign that same user to the app, it will result in an error in Sumo Logic. You must delete the old user from Sumo Logic first so that the user can be provisioned once again from Microsoft Entra ID.)
Copy file name to clipboardExpand all lines: docs/manage/security/scim/provision-from-okta.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,12 +11,6 @@ This article describes how to provision users into Sumo Logic from Okta.
11
11
12
12
## Prerequisites
13
13
14
-
### Set up SAML
15
-
16
-
If it is not already set up, [set up SAML for single sign-on with Okta](/docs/manage/security/saml/integrate-sumo-logic-with-okta/) in the Sumo Logic instance where you will provision users. This will allow connection to Sumo Logic for provisioning. Copy the single sign-on URL (Assertion Consumer URL) and entity ID from your Sumo Logic [SAML configuration](/docs/manage/security/saml/set-up-saml/#review-saml-configuration). You will use them when you set up provisioning.
17
-
18
-
<img src={useBaseUrl('img/security/provision-sumo-logic-saml-settings.png')} alt="ACS and entity ID from Sumo Logic" style={{border: '1px solid gray'}} width="800" />
19
-
20
14
### Create an access key
21
15
22
16
Create an [access key](/docs/manage/security/access-keys/) using a service account. This access key will provide authorization to provision users from Okta into Sumo Logic.
@@ -27,6 +21,12 @@ When you create the access key, copy its access ID and access key values. You wi
If it is not already set up, [set up SAML for single sign-on with Okta](/docs/manage/security/saml/integrate-sumo-logic-with-okta/) in the Sumo Logic instance where you will provision users. This will allow connection to Sumo Logic for provisioning. Copy the single sign-on URL (Assertion Consumer URL) and entity ID from your Sumo Logic [SAML configuration](/docs/manage/security/saml/set-up-saml/#review-saml-configuration). You will use them when you set up provisioning.
27
+
28
+
<img src={useBaseUrl('img/security/provision-sumo-logic-saml-settings.png')} alt="ACS and entity ID from Sumo Logic" style={{border: '1px solid gray'}} width="800" />
0 commit comments