Summary
Azure AD can automatically create users in your MindBridge tenant using an outbound SCIM integration. SCIM is a protocol for automatically creating, disabling, and deleting users.
Prerequisites
First, go through the steps in Implement Single Sign-On (SSO), including the section on implementing additional security restrictions. In particular, all your users should be able to sign in using the Microsoft button.
All users should have an email address associated with their Azure AD account.
You should set up a security group in Azure AD for regular MindBridge users, and a second one for MindBridge app admins. Populate the groups with a few users for testing. Each MindBridge user should only be in one of these groups.
- Nested groups are not supported by Azure AD provisioning; all users must be direct members of one of these groups.
- Dynamic groups are supported.
Contact your CSM to have API access enabled for your MindBridge tenant.
Review the Microsoft guidance on application provisioning for background information.
Creating an API token for SCIM
- Sign into your MindBridge tenant as an app admin.
- In the sidebar ( ) on the left, select Admin ( ) then go to the API tab.
- Select Create token.
- Give the token a name, like SCIM 2023-06-30.
- Select an expiration date.
- Under Permissions, select SCIM.
- Select Create token, and copy the token to your password manager. You'll need it in the next step.
Creating an enterprise application for provisioning
- In Azure AD, go to Enterprise applications > Add > Enterprise application.
- Choose the option to Create your own application.
- Enter a name like "MindBridge provisioning" and choose the non-gallery integration option.
- Click Create.
- After it’s created, under Manage (on the left), go to Provisioning and select Get started.
- Change the provisioning mode to Automatic.
- Set the Tenant URL to the URL of your MindBridge tenant, plus /scim/v2.
For example, if your tenant URL is https://exampletenant.mindbridge.ai, use https://exampletenant.mindbridge.ai/scim/v2. - Set the Secret Token to the token you generated in the previous step.
- Select Test Connection.
- Save.
Two new sections for Mappings and Settings will appear on the same screen.
Disabling group provisioning
- Expand Mappings.
- Disable the option to Provision Azure Active Directory Groups by selecting it and changing the Enabled toggle to No.
- Save the attribute mapping.
- Click the close button to return to the provisioning edit screen.
The mappings should show as follows:
Configuring user provisioning
- Edit the settings for "Provision Azure Active Directory Users" to delete the displayName attribute mapping. It is not used by MindBridge.
- At the bottom of the screen, select the checkbox to Show advanced options.
- Click the Edit attribute list for customappsso link.
- At the bottom of the page, use the input field to add a new attribute.
- Name: roles
- Type: String
- Leave all checkboxes unchecked.
- Save, and you will return to the main attribute mapping page for "Provision Azure Active Directory Users."
- Click the Add New Mapping link.
- Mapping type: Expression
- Expression: SingleAppRoleAssignment([appRoleAssignments])
- Default value if null: leave blank
- Target attribute: roles
- Match objects using this attribute: No (default)
- Apply this mapping: Always (default)
- Click Ok to save and close the attribute mapping.
- Save, then click the close button to return to the provisioning edit screen.
Finalizing provisioning settings
- Under Settings, select first the checkbox to enable email notifications for failures, then supply an email address.
- Select the second checkbox to enable prevention of accidental deletion with a suitable threshold (for example, 10 users).
If the provisioning system believes it needs to delete more than 10 users at once, it will go into a quarantine status for approval first. - Leave the Scope field on the default setting, to sync only assigned users and groups.
- Leave the Provisioning Status toggle Off for now.
- Save and close.
Hiding the provisioning application from users
The provisioning application is not used for SSO and should not appear in the O365 app launcher. In the enterprise application, go to Properties and change the Visible to users toggle to No, then save.
Defining roles
Role definitions are set up under App registrations, not Enterprise applications. To set up the roles, go to Azure AD > App registrations > All applications, and search for the MindBridge provisioning app.
Inside the app registration, go to App roles, Create app role.
- Display name: ADMIN
- Allowed member types: Users/Groups
- Value: ADMIN
- Description: MindBridge App Admins
- Enable role: Checked (default)
Repeat to add another role:
- Display name: ORGANIZATION_CREATOR
- Allowed member types: Users/Groups
- Value: ORGANIZATION_CREATOR
- Description: MindBridge users with permission to create new organizations.
- Enable role: Checked (default)
Repeat for a third role:
- Display name: USER
- Allowed member types: Users/Groups
- Value: USER
- Description: MindBridge users who cannot create new organizations.
- Enable role: Checked (default)
Assigning groups to the provisioning application
- Return to the enterprise application. In Azure AD, go to Enterprise applications and search for the MindBridge provisioning app.
- In the enterprise application, go to Users and Groups > Add user/group.
- Select your MindBridge app admins group.
- For role, select ADMIN, then Assign.
- Add another assignment.
- Select your MindBridge users group.
- For role, select one of the following options (all uppercase):
- ORGANIZATION_CREATOR, if all users should be able to create new organizations (recommended);
- USER, if users should not be able to create new organizations.
- Review your assignments.
Checklist
Before proceeding, confirm that you have:
- Created groups for MindBridge app admins and regular users. The group memberships must be mutually exclusive (each user can only be in one of them). The groups cannot have nested groups.
- Created an enterprise application.
- Tested the connection with "Test Connection".
- Disabled "Provision Azure Active Directory Groups".
- Configured "Provision Azure Active Directory Users":
- Deleted the displayName attribute mapping.
- Added an attribute for "roles".
- Added an attribute mapping for "roles".
- Created app roles in the app registration.
- Assigned groups to the enterprise application.
- Made the application invisible under Properties.
Enabling provisioning
- Go to Provisioning > Edit provisioning.
- Change the provisioning status to On, then save.
- Close to return to the main provisioning page.
- Wait a few seconds, then click Refresh.
A successful provisioning cycle should have run. - Use the option to view provisioning logs to investigate any failures.
- Check the user roles in MindBridge (open the sidebar, click Admin ( ), then go to the User Management tab to ensure the correct roles have been assigned.
Continuing group population
Populate your MindBridge user and app admin groups with the remaining users. Ensure each user is only in one of these groups.
The provisioning cycle runs periodically at the interval displayed on the Provisioning page. Check the logs after the next cycle to confirm your users have been provisioned.
Anything else on your mind? Chat with us or submit a request for further assistance.