Set Up SCIM for Azure Entra
- Print
- DarkLight
Set Up SCIM for Azure Entra
- Print
- DarkLight
Article summary
Did you find this summary helpful?
Thank you for your feedback
This feature is currently in Private Preview.
For more information about getting started, see Manage B2 Cloud Storage at Scale: Enterprise Web Console.
For questions after implementation, contact the Product Team.
Integrating Microsoft Entra ID with Backblaze allows for automated user provisioning.
Generate an API Token
- Sign in to your Backblaze organization.
- In the left navigation menu under Access Control, select Org Users.
- Select the Identity Provider tab.
- Click Import Users.
- Click Generate Key.
- Copy and save the Base URL.
- Copy and save the API Key (API token).
Create an Enterprise Application
- Navigate to https://entra.microsoft.com and sign in.
- In the left navigation menu under Identity, select Applications, then select Enterprise applications.
- Click New application, then click Create your own application.
- Enter a name for your app (for example, Backblaze SCIM).
- Select Integrate any other application you don't find in the gallery (Non-gallery).
- Click Create.
Configure Provisioning
- Sign in to your Azure Entra admin center.
- In the left navigation menu under Identity, select Applications, then select Enterprise applications.
- Under Manage, click Provisioning.
- Click Get started.
- ForProvisioning Mode, select Automatic.
- Enter Admin Credentials.
- Tenant URL: Enter the Base URL that you copied in the “Generate an API Token” task.
- Secret Token: Enter the API Key that you copied in the “Generate an API Token” task.
- Click Test Connection to ensure Microsoft Entra ID can successfully connect to the Backblaze SCIM endpoint.
If the connection is successful, the Mappings section will appear.
- Configure Mappings.
- Ensure that Provision Microsoft Entra ID Users is enabled.
- Click Provision Microsoft Entra ID Groups.
- Set the Enabled toggle to No.
- Click Save, then click Yes to confirm.
- In the Settings menu, Backblaze recommends that you select Sync only assigned users and groups as the Scope.
- Set the Provisioning Status toggle to On.
- Click Save.
Assign Users to the SCIM Configuration
- Sign in to your Azure Entra admin center.
- In the left navigation menu under Identity, select Applications, then select Enterprise applications.
- Select the application for which SCIM provisioning is configured.
- Select Users and groups.
- Click Add user/group.
- Click Users to open the list of available users.
- Select the user(s) or user group(s) you want to assign to the SCIM configuration.
- Click Select.
- Click Assign.
Rotate a SCIM Key
- Sign in to your Backblaze organization.
- In the left navigation menu under Access Control, select Org Users.
- Select the Identity Provider tab.
- Click Edit.
- Click Generate Key.
- Repeat step 6 in the "Configure Provisioning" task to update the API in Azure Entra.
- Click
(delete) to remove the old key.
- Click OK.
Was this article helpful?