Gå til hovedinnhold
Alle samlingerAdmin og Brukeradministrasjon
Hvordan sette opp Entra ID SCIM integrasjon
Hvordan sette opp Entra ID SCIM integrasjon
Fredrik Muri Slettestøl avatar
Skrevet av Fredrik Muri Slettestøl
Oppdatert for over 3 uker siden


SourceMagnet kan integreres med Entra ID ved hjelp av en SCIM-integrasjon. Ved å integrere med Entra ID, vil du ha full kontroll over hvilke brukere som kan logge inn i SourceMagnet, og tillatelser vil automatisk bli trukket tilbake når folk slutter eller bytter stillinger.

Oppskriften er på Engelsk siden dette oppsettet i all hovedsak gjøres i Azure slik at det ikke oppstår misforståelse i forhold til navngivning.

SourceMagnet can be integrated with Entra ID using a SCIM integration. By integrating with Entra ID, you will have full control over which users can log into SourceMagnet, and permissions will automatically be withdrawn when people quit or change positions.

How to enable SCIM

1. Get provisioning secret from SourceMagnet

Click on your company name and select Access Management, select the Entra ID tab in SourceMagnet as an Admin or Owner, and get the provisioning secret.

2. Create an Enterprise application in Azure

Go to Enterprise Applications in Azure and create a Non-gallery application for provisioning.


In the new enterprise application, go to provisioning and

4. Configure "Provision Microsoft Entra ID Users"

In attribute mappings for "Provision Microsoft Entra ID Users" validate or map the following properties:

  • userName

  • active (has no practical implications in SourceMagnet atm., but is required by Microsoft)

  • title

  • name.givenName

  • name.familyName

  • delete other mappings that are not listed above

Save changes

5. Configure "Provision Microsoft Entra ID Groups"

Turn on "Target Object Actions" for "Create", "Update", and "Delete".

In attribute mappings for "Provision Microsoft Entra ID Groups" validate or map the following properties:

  • displayName = displayName

  • externalId = objectId

  • members = members

Save changes

6. Create groups

The roles for å user will be defined based on the user's group membership in Entra ID.
Create the following groups with the exact Group names as below:

  • "SourceMagnetAdmin"

  • "SourceMagnetContractCreator"

  • "SourceMagnetContractViewer"

  • "SourceMagnetSourcingCreator"

  • "SourceMagnetSourcingViewer"

  • "SourceMagnetProjectCreator"

  • "SourceMagnetProjectViewer"

Assing group membership to users to give them the correct role in SourceMagnet.

A user that needs multiple roles must be assigned to multiple groups in Entra.

7. Give access to users/groups

In Azure, open Enterprise Application and select SourceMagnet app.

Go to "Users and groups"

Click "+ Add user/Group"

Add the groups or users that you want to give access to and select among the available roles.

💡 To give a user multiple roles in SourceMagnet, the user must be assigned to multiple groups. One group will give the user a "Sourcing creator" role, and one group will provide the user a "Contract creator" role.

8. Start provisioning

Start the provisioning

💡 You might have to add sourcemagnet.com to trusted domains.

Svarte dette på spørsmålet?