Skip to main content

Identity Provider Configuration

Beta Feature

SCIM is currently in beta for Passbolt Pro. It will be available for Passbolt Cloud once it exits beta.

Configure your identity provider (Microsoft Entra ID or Okta) to provision users to Passbolt using SCIM.

Prerequisites

Before configuring your identity provider, ensure you have:

  • Passbolt SCIM enabled and configured (see SCIM Setup Guide)
  • Administrator access to your identity provider
  • The SCIM endpoint URL and authentication token from Passbolt

Supported Identity Providers

SCIM has been tested with:

  • Microsoft Entra ID (Azure AD)
  • Okta

Configuration Requirements

Required SCIM Settings

When configuring your identity provider, you'll need:

  • SCIM Endpoint URL: https://your-passbolt-instance.com/scim/v2/<settings_id>
  • Authentication: Bearer token (format: pb_[A-Za-z0-9]{43})
  • Authentication Header: Authorization: Bearer YOUR_TOKEN

Required User Attributes

Your identity provider must provide these attributes:

AttributeSCIM PathDescription
UsernameuserNameUnique identifier (email address)
First Namename.givenNameUser's first name
Last Namename.familyNameUser's last name
Emailemails[0].valuePrimary email address

Supported Operations

Configure your identity provider to support:

  • Create Users
  • Update User Attributes
  • Deactivate Users
  • Delete Users

Microsoft Entra ID Configuration

Based on Microsoft's official documentation, configure SCIM provisioning with these key steps:

1. Create Enterprise Application

  • Sign in to the Microsoft Azure Portal
  • Navigate to Microsoft Entra IDEnterprise applications
  • Click + New applicationCreate your own application
  • Provide a descriptive name and select Non-gallery
  • Click Create

2. Configure Provisioning

  • Go to the Provisioning section in your application
  • Set Provisioning Mode to Automatic
  • Under Admin Credentials:
    • Tenant URL: Your Passbolt SCIM endpoint URL
    • Secret Token: Your Passbolt authentication token
  • Click Test Connection to verify credentials
  • Click Save

3. Configure Attribute Mappings

  • Expand Mappings section → Provision Microsoft Entra ID Users
  • Ensure essential attributes are correctly mapped:
    • userPrincipalNameuserName
    • givenNamename.givenName
    • surnamename.familyName
    • mailemails[0].value
  • Click Save

4. Assign Users

  • Navigate to Users and groups section
  • Click Add user/group
  • Select users to provision to Passbolt
  • Click Assign

5. Start Provisioning

  • Return to Provisioning section
  • Set Provisioning Status to On
  • Click Save and Start provisioning

Official Documentation: Microsoft's SCIM provisioning guide

Okta Configuration

Based on Okta's official documentation, configure SCIM provisioning with these key steps:

1. Create SCIM Application

  • Sign in to your Okta admin console
  • Navigate to ApplicationsAdd Application
  • Click Create New App
  • Choose SCIM 2.0 App as the sign-on method
  • Enter application name and click Create

2. Configure SCIM Connection

  • Go to Provisioning tab → Configure API Integration
  • Check Enable API Integration
  • Enter your Passbolt SCIM endpoint details:
    • Base URL: Your Passbolt SCIM endpoint URL
    • API Token: Your Passbolt authentication token
  • Click Test API Credentials to verify connection
  • Click Save

3. Configure Provisioning Settings

  • In Provisioning tab, specify actions to perform:
    • Create users
    • Update user attributes
    • Deactivate users
  • Map Okta user attributes to Passbolt SCIM attributes as needed

4. Assign Users

  • Navigate to Assignments tab
  • Assign users to provision to Passbolt

5. Activate Provisioning

  • Ensure provisioning settings are enabled
  • Monitor provisioning logs to verify successful user provisioning

Official Documentation: Okta's SCIM documentation

Testing

Test your configuration with a small number of users before enabling for your entire organization.

Troubleshooting

If you encounter issues:

  1. Verify your SCIM endpoint URL format
  2. Check that your authentication token is correctly formatted
  3. Ensure required user attributes are populated
  4. Review provisioning logs in your identity provider