Skip to main content

Version: 3.9.x

SCIM Provisioning with Microsoft Entra ID

Microsoft Entra ID can provision users into API7 Gateway by using SCIM (System for Cross-domain Identity Management).

This guide walks you through configuring SCIM provisioning between Microsoft Entra ID and the API7 Dashboard.

Prerequisites

Before you begin, ensure you have:

  • API7 Gateway is installed and the Dashboard is accessible.
  • You have a Microsoft Entra ID tenant with administrative privileges.
  • You have a user account in API7 Gateway with permission to manage organization settings.
  1. Sign in to the Microsoft Entra admin center.
  2. Go to Enterprise applications -> New application.
  3. Click Create your own application.
  4. Enter an application name.
  5. Select Integrate any other application you don't find in the gallery (Non-gallery).
  6. Click Create.

Step 2: Enable SCIM in API7 Gateway

  1. Log in to the API7 Dashboard with an administrative account.
  2. Go to Organization -> Settings.
  3. Enable SCIM Provisioning.
  4. Copy the API7 SCIM Endpoint URL and SCIM Token.

Step 3: Configure Provisioning in Microsoft Entra ID

  1. Open the enterprise application you created.
  2. Go to Provisioning.
  3. Change Provisioning Mode to Automatic.
  4. In Authentication Method, keep Bearer Authentication selected.
  5. Set Tenant URL to the SCIM endpoint copied from API7 Gateway.
  6. Set Secret Token to the SCIM token copied from API7 Gateway.
  7. Click Test Connection.
  8. Confirm the success message: The supplied credentials are authorized to enable provisioning.
  9. Click Save.

Microsoft Entra provisioning page

Step 4: Update Provisioning Settings

  1. In the same Provisioning page, expand Settings.
  2. Set Scope to Sync all users and groups.
  3. Under Provisioning Status, select On.
  4. Click Save.

Using Sync all users and groups avoids the Entra entitlement check that can otherwise prevent on-demand provisioning from reaching the SCIM create step.

Step 5: Review Default Mappings

After saving the connection, Microsoft Entra ID enables the default SCIM mappings for:

  • Provision Microsoft Entra ID Users
  • Provision Microsoft Entra ID Groups

Step 6: Assign Users or Groups

  1. Go to Users and groups in the enterprise application.
  2. Click Add user/group.
  3. Select the users or groups you want to provision.
  4. Click Assign.

Microsoft Entra users and groups

Step 7: Validate Provisioning Behavior

  1. Return to Provisioning.

  2. Open Provision on demand.

  3. Search for an assigned user and run an on-demand provisioning attempt.

  4. Confirm the following steps succeed:

    • Import user
    • Determine if user is in scope
    • Match user between source and target system
    • Perform action

In the validated flow, Microsoft Entra ID successfully created the user in the target application. The result pane showed:

  • Perform action: Success
  • Result: User '<userPrincipalName>' was created in customappsso

Step 8: Verify the Provisioned User in API7 Gateway

  1. Return to the API7 Dashboard.
  2. Go to Organization -> Users.
  3. Confirm that the user provisioned from Microsoft Entra ID appears in the user list.

Verify users in Dashboard

SCIM provisions the user accounts, but role assignments are still governed by API7 Gateway RBAC. If you also configure Dashboard SSO role mapping, user roles can be refreshed during login based on your SSO mapping rules.

If you also configure Dashboard SSO, provisioned users can be managed through Microsoft Entra ID while authenticating through your selected login option.

Next Steps

API7.ai Logo

The digital world is connected by APIs,
API7.ai exists to make APIs more efficient, reliable, and secure.

Sign up for API7 newsletter

Product

API7 Gateway

SOC2 Type IIISO 27001HIPAAGDPRRed Herring

Copyright © APISEVEN PTE. LTD 2019 – 2026. Apache, Apache APISIX, APISIX, and associated open source project names are trademarks of the Apache Software Foundation