Set Up SCIM for Azure Entra
- Print
- DarkLight
Set Up SCIM for Azure Entra
- Print
- DarkLight
Article summary
Did you find this summary helpful?
Thank you for your feedback
Integrating Microsoft Entra ID with Backblaze allows for automated user provisioning.
Generate an API Token
- Sign in to your Backblaze organization.
- In the left navigation menu under Access Control, select Org Users.
- Select the Identity Provider tab.
- Click Import Users.
- Click Generate Key.
- Copy and save the Base URL.
- Copy and save the API Key (API token).
Create an Enterprise Application
- Navigate to https://entra.microsoft.com and sign in.
- In the left navigation menu under Identity, select Applications.
- Select Enterprise applications.
- Click New application, then click Create your own application.
- Enter a name for your app (for example, Backblaze SCIM).
- Select Integrate any other application you don't find in the gallery (Non-gallery).
- Click Create.
Configure Provisioning
- Sign in to your Azure Entra admin center.
- In the left navigation menu under Identity, select Applications.
- Select Enterprise applications.
- Under Manage, click Provisioning.
- Click Get started.
- For Provisioning Mode, select Automatic.
- Enter Admin Credentials.
- Tenant URL: Enter the Base URL that you copied in the “Generate an API Token” task.
- Secret Token: Enter the API Key that you copied in the “Generate an API Token” task.
- Click Test Connection to ensure Microsoft Entra ID can successfully connect to the Backblaze SCIM endpoint.
If the connection is successful, the Mappings section will appear.
- Configure Mappings.
- Ensure that Provision Microsoft Entra ID Users is enabled.
- Click Provision Microsoft Entra ID Groups.
- Set the Enabled toggle to No.
- Click Save, then click Yes to confirm.
- In the Settings menu, Backblaze recommends that you select Sync only assigned users and groups as the Scope.
- Set the Provisioning Status toggle to On.
- Click Save.
Assign Users to the SCIM Configuration
- Sign in to your Azure Entra admin center.
- In the left navigation menu under Identity, select Applications.
- Select Enterprise applications.
- Select the application for which SCIM provisioning is configured.
- Select Users and groups.
- Click Add user/group.
- Click Users to open the list of available users.
- Select the user(s) or user group(s) you want to assign to the SCIM configuration.
- Click Select.
- Click Assign.
Rotate a SCIM Key
- Sign in to your Backblaze organization.
- In the left navigation menu under Access Control, select Org Users.
- Select the Identity Provider tab.
- Click Edit.
- Click Generate Key.
- Repeat step 6 in the "Configure Provisioning" task to update the API in Azure Entra.
- Click
(delete) to remove the old key. - Click OK.
Was this article helpful?