Configure SCIM for user syncing with Microsoft Entra ID
SCIM is a system that allows for keeping Diggspace users in sync with your organization's Entra ID, ensuring that the user list in Diggspace is as up-to-date as possible.
Follow the steps below to set up SCIM.
Generating the SCIM token
The first step is to generate the SCIM token within Diggspace.
- Access your Diggspace portal with a Global Admin account
- Go to Global Setting > SCIM Provisioning
- Click the button "Generate Token" and save the token generated for later

You need Global Admin permissions to do this. If the Entra ID admin is not a Global Admin in Diggspace, please share the generated token with them
Setting up SCIM in Entra ID
- Sign in to the Azure portal with an Entra ID Admin account.
- Browse to Microsoft Entra ID > Manage > Enterprise applications.

- Click + New Application.

- In
the Browse Microsoft Entra Gallery, select +
Create your own application.
- In the new panel:
- Enter the name for the application (e.g. Diggspace SCIM) and then, choose the option "Integrate any other application you don't find in the
gallery".

- Select Add to create an app object.
- In
the app management screen, select Provisioning,
under the Manage section in the left panel.
- In the Provisioning page, perform the following
configurations:
- In Provisioning
Mode, select Automatic.
- Expand the Admin
Credentials section:
- In Tenant
URL,
insert "<your-tenant-url>/cms/scim/v2/".
- In Secret
Token, insert
the SCIM token generated by Diggspace in the section above.
- Click the Test Connection button to have
Azure AD attempt to connect to the SCIM endpoint. If the attempt fails,
an error warning is displayed.
If the connection succeeds,
then select Save to save the admin credentials.
- Expand the Mappings section (if you can't see it, or it is disabled, wait a few minutes with the page open):
- Click on
the Provision Azure Active Directory Groups link:
- In Enabled, select No. Only user
provisioning is currently fully supported.
- Select Save

- Click on the Provision
Azure Active Directory Users link:
- In Enabled, select Yes.
- In Target
Object Actions,
check the Create, Update and Delete options, if not already checked.
In the Attributes
Mappings, delete all but the following mappings (these are the fields
that will be synced):
Azure Active Directory Attribute
(Source attribute) | customappsso Attribute (Target
attribute) |
userPrincipalName | userName |
Switch([IsSoftDeleted],
, "False", "True", "True", "False") | active |
displayName | displayName |
mail | emails[type
eq "work"].value |
givenName | name.givenName |
surname | name.familyName |
telephoneNumber | phoneNumbers[type
eq "work"].value |
mobile | phoneNumbers[type
eq "mobile"].value |
objectId | externalId |
department | urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department |
manager | urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager |
jobTitle | title |
- Select Add New
Mapping link,
under the mappings table. In the Edit Attribute page:
- In Mapping
type, select Direct.
- In Source
attribute,
select companyName.
- In Target
attribute,
select urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:organization.
- In Match
objects using this attribute, select No.
- In Apply this
mapping, select Always.
- Click the Ok button, at the bottom of the
page.
- Select Save.

- Select Users and
groups, under
Manage. This tab will display a list of users and groups to be synced
- Select + Add user/group
- Click on the None Selected link, under Users and groups.
- In the new tab, check the users and/or groups to be provisioned. You can create new groups or use existing ones.
⚠️Please
note that guest users will also be provisioned by Entra ID. If you don't intend
for that to happen, it is best to create a new group without guest users - When you're done, click on the Select button, and then the Assign button.

- To test
user provisioning, select Provision on demand in the left panel:
- In Select user
or group,
search for a user by name.
- Select the intended user in
the search results and click the Provision button, at the bottom of the
page.
- Entra ID will attempt to
sync the user with app. If all steps displayed in the screen were a success,
then provisioning is working.
- If not,
click View Details link to see more information, and also verify the Provisioning
logs (in the
Monitor section in the left panel) as well.
NOTE: It is best to
start by provisioning a user without a manager, if possible. When provisioning
a user without a manager, Entra ID will skip this field when syncing, because
the manager's user was not previously provision

- To automate
the provisioning of all users, select Overview.
- Select Start
provisioning.
- In the Current
cycle status,
the provisioning status can be consulted.
Provisioning usually runs every 40 minutes by default, when on. - To see
logs, select Provisioning logs, in the Monitor section in the left panel.

Related Articles
Configure which Entra ID users have access to Diggspace
If you use the Microsoft authentication provider, by default, all users in your Azure tenant will have access to Diggspace. In this article, we'll show you how to restrict access to only some users in the tenant. Restricting access to specific users ...
User Menu & Settings
The portal settings are available from the User Menu on the top right bar, by clicking on your profile picture or this icon: From here, people with admin access are able to see a full list of setting that will allow them to manage the portal. My ...
Setting up the Microsoft 365 login
Diggspace comes with a Microsoft 365 authentication provider out of the box. To start logging in with your Microsoft 365 account, follow the steps below: The steps below have to be executed by a Diggspace user with the Global Admin role, and an Entra ...
Microsoft 365 Search
As a hub for your company's work, Diggspace integrates with the Microsoft 365 search, to ensure that you can search for what you need, in one central location. With the Microsoft 365 search integration, you can search for OneDrive files and ...
Changelog
A full list of all Diggspace updates – from big improvements to obscure bug fixes – updated bi-weekly. Made possible by your ideas and bug reports. Thank you! ? Looking for just the big, exciting stuff? ? See all new features. February 12, 2025 ? ...