You can also reach out to support@langdock.com to set up your SCIM integration with assistance.

Prerequisites

  • Access to an admin account in your Langdock workspace.
  • An Entra ID account with the rights to manage Enterprise applications.
  • An Enterprise application (see the SAML with Entra ID documentation page to learn how to create one: https://docs.langdock.com/settings/security/entra)

Configure connection

1. Navigate to the Enterprise application that you set up for the SAML connection in your Azure Portal (as described in https://docs.langdock.com/settings/security/entra).

Click on “Get started” under “Provision User Accounts”.

2. Click “Connect your application”

3. Go over to your Langdock security settings and copy the “SCIM Base URL” value.

4. Back in your Azure Portal, enter the SCIM Base URL into the “Tenant URL” field and (!) append ?aadOptscim062020 to the end of the URL to fix known issues in Microsoft’s implementation of the SCIM protocol.

Your final “Tenant URL” will look like this: https://app.langdock.com/api/scim/v2?aadOptscim062020

5. Copy the “SCIM Bearer Token (API Key)” value from your Langdock security settings

6. …and paste it into the “Secret token” field in your Azure Portal.

7. Toggle “SCIM User Sync Active” to enable SCIM for your workspace in your Langdock security settings. This is required to test the connection.

8. Back in your Azure Portal click on “Test connection” and you should see a message confirming that the connection between Entra ID and Langdock is working.

9. Click “Create” to finish the configuration

Optional: Disable group synchronization

10. (Optional) To customize your provisioning settings, go to “Manage” > “Provisioning”. You might need this if you want to only synchronize users (but not groups) or if you want to disable one or more types of object actions (create, update or delete).

E.g. to disable synchronizing groups, click on “Mappings” and follow the optional steps below

11. (Optional: Disabling group synchronization) Click “Provision Microsoft Entra ID Groups”

12. (Optional: Disabling group synchronization) Click “No”

13. (Optional: Disabling group synchronization) Click “Save” then “Yes” to confirm changes

Enable provisioning

14. Recommended: Open down “Settings”, click “Send an email notification when a failure occurs” and enter your email address

15. Click “On” to set provisioning status to enabled

16. Click on “Save” to finalize your changes

Verify your setup

17. To verify that the provisioning is working as expected, go to “Monitor” > “Provisioning logs” and check if your users have been successfully mapped to Langdock.

In case you don’t see any logs, make sure to wait and check back in a couple of minutes. It can take a bit until the first synchronization is triggered.

If your setup was successful, you will see “Success” values in the status column.

18. You should also see the newly synchronized users in your Langdock member settings.