--- title: "SCIM Integration: MS Entra and DataHub" hide_title: true --- import FeatureAvailability from '@site/src/components/FeatureAvailability'; ## SCIM Integration: MS Entra and DataHub ## Overview On completion of this setup the MS Entra will automatically manage the groups/users/roles from MS Entra to DataHub. Consider following configuration in MS Entra - A group `governance-team` group - And it has two memeber `john` and `sid` - And the group has role `Reader` If you configure the `governance-team` for auto provisioning, MS Entra will creates the `governance-team` group and it's member automatically on DataHub and set the `Reader` roles on users. If you remove `john` from group `governance-team` then MS Entra will automatically removes the `john` from DataHub's `governance-team` group. If you permanently deletes a user or group from MS Entra then MS Entra will automatically deletes the user or group from the DataHub. > MS Entra doesn't send the user's password on user creation and hence DataHub Admin need to reset their password to be able to login into the DataHub. > Only Admin, Editor and Reader roles are supported in DataHub. These roles are preconfigured/created on DataHub ## Configuring User/Group/Roles provisioning from MS Entra to DataHub 1. **Generate Personal Access Token**: Generate a personal access token from [DataHub](../../docs/authentication/personal-access-tokens.md#creating-personal-access-tokens). 2. **Integrate DataHub With MS Entra**: Follow steps [Integrate your SCIM endpoint with the Microsoft Entra provisioning service](https://learn.microsoft.com/en-gb/entra/identity/app-provisioning/use-scim-to-provision-users-and-groups#integrate-your-scim-endpoint-with-the-microsoft-entra-provisioning-service) to integrate DataHub SCIM endpoint into MS Entra. a. Set the `Tenant URL` to `https:///gms/openapi/scim/v2`. Replace `` with your DataHub instance hostname. b. Set the `Secret Token` to Personal Access Token created in Step 1. 3. **Update Attribute Mapping For Role**: a. Go to `Provisioning` section inside the App and click on `Provision Microsoft Entra ID Users` as shown in below image

b. Click on `Add Mapping`

c. Fill detail as shown in below image Fill listed fields - Set `Mapping type` to `Expression` - Set `Expression` to `SingleAppRoleAssignment([appRoleAssignments])` - Set `Target attribute` to `roles[primary eq "True"].value` - Set `Match objects using this attribute` to `No` - Set `Apply this mapping` to `Always`

d. **Create Role**: Go back to the app created in Step #1 and go to the Provisioning section and click on application registration. to create the role

Create three roles having `Display Name` and `Value` as mentioned below - Admin - Editor - Reader Only these three roles are supported in DataHub. e. While creating the App Role set `Allowed member types` to `Users/Groups` 4. **Add Users/Groups/Roles in the App**: Go to application created in step #1 and click on `Add user/group` as shown in below image

On the screen choose - Group/User - And role for the Group/User. The role should be one of the role created in Step 3