SCIM provisioning with Microsoft Entra ID
With SCIM (System for Cross-domain Identity Management) enabled, you can automate user provisioning in Cube and keep user groups synchronized with Microsoft Entra ID (formerly Azure Active Directory).Available on Enterprise and above plans.
Prerequisites
Before proceeding, ensure you have the following:- Microsoft Entra SAML authentication already configured. If not, complete the SAML setup first.
- Admin permissions in Cube.
- Sufficient permissions in Microsoft Entra to manage Enterprise Applications.
Enable SCIM provisioning in Cube
Before configuring SCIM in Microsoft Entra, you need to enable SCIM provisioning in Cube:- In Cube, navigate to Admin → Settings.
- In the SAML section, enable SCIM Provisioning.
Generate an API key in Cube
To allow Entra ID to communicate with Cube via SCIM, you’ll need to create a dedicated API key:- In Cube, navigate to Settings → API Keys.
- Create a new API key. Give it a descriptive name such as Entra SCIM.
- Copy the generated key and store it securely — you’ll need it in the next step.
Set up provisioning in Microsoft Entra
This section assumes you already have a Cube Enterprise Application in Microsoft Entra. If you haven’t created one yet, follow the SAML setup guide first.- Sign in to the Microsoft Entra admin center.
- Go to Applications → Enterprise Applications and open your Cube application.
- Navigate to Manage → Provisioning.
- Set the Provisioning Mode to Automatic.
- Under Admin Credentials, fill in the following:
- Tenant URL — Your Cube deployment URL with
/api/scim/v2appended. For example:https://your-deployment.cubecloud.dev/api/scim/v2 - Secret Token — The API key you generated in the previous step.
- Tenant URL — Your Cube deployment URL with
- Click Test Connection to verify that Entra ID can reach Cube. Proceed once the test is successful.
Configure attribute mappings
Next, configure which user and group attributes are synchronized with Cube:- In the Mappings section, select the object type you want to configure — either users or groups.
- Remove all default attribute mappings except the following:
- For users: keep
userName,displayNameandactive. - For groups: keep
displayNameandmembers.
- For users: keep
- Click Save.
Users provisioned via SCIM will receive the Explorer role.
To grant admin permissions, update the user’s role manually in
Cube under Team & Security.
Syncing user attributes
You can sync user attributes from Microsoft Entra to Cube via SCIM, allowing you to centralize user management in Entra.Create a user attribute in Cube
In Cube, navigate to Admin → Settings → User Attributes and create a new attribute. Take note of the attribute reference name — you will need it when configuring Entra.Create an Entra user attribute
- In the Microsoft Entra admin center, navigate to Applications → Enterprise Applications and open your Cube application.
- Go to Manage → Provisioning → Mappings.
- Select the user mapping you want to add the attribute to.
- At the bottom of the page, select Show advanced options.
- Select Edit attribute list for customappsso.
- Add a new attribute with the following settings:
- Name — The reference of the attribute you created in Cube,
prefixed with
urn:cube:params:1.0:UserAttribute:. For example, for an attribute with the referencecountry, enterurn:cube:params:1.0:UserAttribute:country. - Type — Select the matching type (
stringorinteger).
- Name — The reference of the attribute you created in Cube,
prefixed with
- Save the changes.
Create attribute mapping
- After saving, click Yes when prompted.
- In the Attribute Mapping page, click Add New Mapping.
- In the Target attribute dropdown, select the attribute you created in the previous step.
- Configure the source mapping to the appropriate Entra field.
- Click OK, then Save.