# SCIM

### How it works

SCIM (System for Cross-domain Identity Management) is an open standard for automating user provisioning. The SCIM protocol acts as an intermediary, collecting user identity data from identity providers (Azure AD, Google Workspace, Okta...) and communicating it to service providers (such as Dastra) who need the credentials.

{% hint style="info" %}
We strongly recommend that you first set up SSO with the "Force for all users" option enabled.
{% endhint %}

### How do I configure SCIM with Azure Active Directory?

Dastra users can be added, deleted and modified using SCIM 2.0.&#x20;

You define groups in your Azure Directory, and Dastra can synchronize these users. It's an ideal way to save time and hassle managing user accounts. It's also an ideal implementation of security.

#### 1. Log on to Azure and click on Azure Active Directory

<figure><img src="https://www.reftab.com/img/faq/01-azure.png" alt="01-Azure-SCIM"><figcaption></figcaption></figure>

#### 2. Go to "Enterprise applications".

<figure><img src="https://www.reftab.com/img/faq/02-azure.png" alt="01-Azure-SCIM"><figcaption></figcaption></figure>

#### 3. Click on "New application"

<figure><img src="https://www.reftab.com/img/faq/03-azure.png" alt="03-Azure-SCIM"><figcaption></figcaption></figure>

#### 4. Click on "Create your own application".

<figure><img src="https://www.reftab.com/img/faq/04-azure.png" alt="04-Azure-SCIM"><figcaption></figcaption></figure>

#### 5. Name your application

#### 6. In the newly created application, click on "Provision User Accounts".

<figure><img src="https://www.reftab.com/img/faq/06-azure.png" alt="06-Azure-SCIM"><figcaption></figcaption></figure>

#### 7. Click on "Get Started"

<figure><img src="https://www.reftab.com/img/faq/07-azure.png" alt="07-Azure-SCIM"><figcaption></figcaption></figure>

#### 8. Set provisioning mode to automatic. Fill in the tenant URL and secret token from your Dastra account information.

Log on to Dastra as administrator. Go to Organization configuration > click on Security / SCIM

![](https://2697025545-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LvBxs22wUMicv9uWp6C-1972196547%2Fuploads%2Fh4m1IXsFBTj9vLfgZiGH%2Fimage.png?alt=media\&token=b28bcfa0-7380-4b8c-8617-eaafff1d9f9f)

Click on the "Configure" button

<figure><img src="https://2697025545-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LvBxs22wUMicv9uWp6C-1972196547%2Fuploads%2FbYzG6P1UQBMxFr4vH836%2Fimage.png?alt=media&#x26;token=bac69d93-9d60-4390-aacd-9182ac038178" alt=""><figcaption></figcaption></figure>

Configure your SCIM. Select the workspace you wish to synchronize (teams and users will be automatically provisioned in this workspace). Then choose the default role you wish to give to new users. Note that roles will be managed locally by the Dastra account administrator.&#x20;

Click on **Save changes**

{% hint style="info" %}
Today, Dastra lets you synchronize a single workspace per organization in SCIM (teams + users).
{% endhint %}

Click on "**Test connection**" and "**Save**".  If you encounter an error during the connection test, this may be due to a lack of activated functionality in your subscription. Please contact support

#### 9. Activate provisioning

<figure><img src="https://2697025545-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LvBxs22wUMicv9uWp6C-1972196547%2Fuploads%2FLLJ5uHgz90W600HQJOSk%2Fimage.png?alt=media&#x26;token=509de3cf-e28c-4177-8075-c025ad5c4a6c" alt=""><figcaption></figcaption></figure>

#### 10. Add users and/or groups to the created application

<figure><img src="https://2697025545-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LvBxs22wUMicv9uWp6C-1972196547%2Fuploads%2FP3jjjTUsNbgvMaToK2T7%2Fimage.png?alt=media&#x26;token=1a139991-b2de-40b4-8004-00b1d63b2c3a" alt=""><figcaption></figcaption></figure>

### Let your users log in to Dastra

You should see your AD user accounts automatically synchronized in Dastra. If they log in to Dastra via the login page, they should be able to log in with their e-mail. If SSO is not configured and enforced for all users, users will need to do a password reset to log in.&#x20;

If SSO is enabled and forced for all users, they will be automatically redirected to your identity provider's login form (Azure AD, Google Workspace, Okta...).

### SCIM Synchronization Behavior and Limitations

#### User Lifecycle Management

**User Disabled in Entra ID**

When a user is disabled in Entra ID:

* Their profile is **anonymized in Dastra**
* If the user is later re-enabled:
  * A **new user account is created**
  * The previous anonymized account is not restored

***

**Full Deletion in Entra ID**

When a user is permanently deleted from Entra ID:

* Their profile is **fully anonymized in Dastra**
* All past actions are **preserved**
* The user appears as **"deleted user"**

**Impact on related data:**

* Linked objects (e.g. processing activities, risks, requests, etc.) are **not deleted**
* Relationships (e.g. owner, assignee) are **preserved**
* Only the user’s identity is anonymized

***

#### Group (Team) Management

**Group Removal in Entra ID**

If a group is removed in Entra ID:

* The corresponding **team is deleted in Dastra**
* **User accounts remain active**
* No impact on individual users

***

#### Mapping and Synchronization Scope

**Groups and Workspaces**

* SCIM supports synchronization of **multiple groups**
* Current limitation:
  * Only **one workspace per organization** can be synchronized
  * Multi-workspace synchronization is **not supported**

***

**Supported Attributes**

Currently, Dastra synchronizes:

* Group **name (`displayName`)**

Not supported at this stage:

* Mapping to **organizational units**
* Synchronization of attributes such as:
  * organization
  * country

> This could be supported in the future via a specific attribute containing a reference identifier compatible with Dastra.

***

#### Local Management in Dastra

After SCIM synchronization:

* Administrators can still:
  * **modify roles**
  * **adjust permissions**
* Fine-grained access control remains **manageable locally in Dastra**

***

#### Licensing Impact

* SCIM synchronization is limited by:
  * the **number of users included in your subscription**
* If the quota is exceeded:
  * The SCIM server returns an **error**
  * Additional users are **not provisioned**


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://doc.dastra.eu/en/features/settings/scim.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
