SCIM
On this page you will learn how to configure SCIM within Dastra
Dernière mise à jour
On this page you will learn how to configure SCIM within Dastra
Dernière mise à jour
SCIM (System for Cross-domain Identity Management) is an open standard for automating user provisioning. The SCIM protocol acts as an intermediary, collecting user identity data from identity providers (Azure AD, Google Workspace, Okta...) and communicating it to service providers (such as Dastra) who need the credentials.
We strongly recommend that you first set up SSO with the "Force for all users" option enabled.
Dastra users can be added, deleted and modified using SCIM 2.0.
You define groups in your Azure Directory, and Dastra can synchronize these users. It's an ideal way to save time and hassle managing user accounts. It's also an ideal implementation of security.
Log on to Dastra as administrator. Go to Organization configuration > click on Security / SCIM
Click on the "Configure" button
Configure your SCIM. Select the workspace you wish to synchronize (teams and users will be automatically provisioned in this workspace). Then choose the default role you wish to give to new users. Note that roles will be managed locally by the Dastra account administrator.
Click on Save changes
Today, Dastra lets you synchronize a single workspace per organization in SCIM (teams + users).
Click on "Test connection" and "Save". If you encounter an error during the connection test, this may be due to a lack of activated functionality in your subscription. Please contact support
You should see your AD user accounts automatically synchronized in Dastra. If they log in to Dastra via the login page, they should be able to log in with their e-mail. If SSO is not configured and enforced for all users, users will need to do a password reset to log in.
If SSO is enabled and forced for all users, they will be automatically redirected to your identity provider's login form (Azure AD, Google Workspace, Okta...).