Microsoft Entra ID
Provision users from Entra ID to Langdock using SCIM.
You can also reach out to support@langdock.com to set up your SCIM integration with assistance.
Prerequisites
- Access to an admin account in your Langdock workspace.
- An Entra ID account with the rights to manage Enterprise applications.
- An Enterprise application (see the SAML with Entra ID documentation page to learn how to create one: https://docs.langdock.com/settings/security/entra)
Configure connection
1. Navigate to the Enterprise application that you set up for the SAML connection in your Azure Portal (as described in https://docs.langdock.com/settings/security/entra).
Click on “Get started” under “Provision User Accounts”.
2. Click “Connect your application”
3. Go over to your Langdock security settings and copy the “SCIM Base URL” value.
4. Back in your Azure Portal, enter the SCIM Base URL into the “Tenant URL” field and (!) append ?aadOptscim062020
to the end of the URL to fix known issues in Microsoft’s implementation of the SCIM protocol.
Your final “Tenant URL” will look like this: https://app.langdock.com/api/scim/v2?aadOptscim062020
5. Copy the “SCIM Bearer Token (API Key)” value from your Langdock security settings…
6. …and paste it into the “Secret token” field in your Azure Portal.
7. Toggle “SCIM User Sync Active” to enable SCIM for your workspace in your Langdock security settings. This is required to test the connection.
8. Back in your Azure Portal click on “Test connection” and you should see a message confirming that the connection between Entra ID and Langdock is working.
9. Click “Create” to finish the configuration
Optional: Disable group synchronization
10. (Optional) To customize your provisioning settings, go to “Manage” > “Provisioning”. You might need this if you want to only synchronize users (but not groups) or if you want to disable one or more types of object actions (create, update or delete).
E.g. to disable synchronizing groups, click on “Mappings” and follow the optional steps below
11. (Optional: Disabling group synchronization) Click “Provision Microsoft Entra ID Groups”
12. (Optional: Disabling group synchronization) Click “No”
13. (Optional: Disabling group synchronization) Click “Save” then “Yes” to confirm changes
Enable provisioning
14. Recommended: Open down “Settings”, click “Send an email notification when a failure occurs” and enter your email address
15. Click “On” to set provisioning status to enabled
16. Click on “Save” to finalize your changes
Verify your setup
17. To verify that the provisioning is working as expected, go to “Monitor” > “Provisioning logs” and check if your users have been successfully mapped to Langdock.
In case you don’t see any logs, make sure to wait and check back in a couple of minutes. It can take a bit until the first synchronization is triggered.
If your setup was successful, you will see “Success” values in the status column.
18. You should also see the newly synchronized users in your Langdock member settings.
Was this page helpful?