docs/sources/setup-grafana/configure-access/configure-scim-provisioning/configure-scim-with-entraid/_index.md
{{< admonition type="note" >}} Available in Grafana Enterprise and Grafana Cloud. {{< /admonition >}}
This guide explains how to configure SCIM provisioning with Entra ID to automate user and team management in Grafana.
{{< admonition type="note" >}} Important SAML and SCIM Configuration: When using SAML for authentication alongside SCIM provisioning with Entra ID, it is crucial to correctly align user identifiers. For detailed information on why this is critical for security and how to configure it, refer to the main SCIM provisioning documentation.
Refer to the SAML authentication with Entra ID documentation for specific instructions on how to configure SAML claims and Grafana SAML settings for your Entra ID SCIM setup. {{< /admonition >}}
Before configuring SCIM with Entra ID, ensure you have:
To enable SCIM provisioning in Grafana, create a service account and generate a service account token that will be used to authenticate SCIM requests from Entra ID.
Configure the enterprise application in Entra ID to enable automated user and team synchronization with Grafana. This involves creating a new application and setting up both authentication and provisioning.
Tenant URL:
You can copy the tenant URL directly from the SCIM UI at Administration > Authentication > SCIM. Your stack domain and stack ID can also be found in the SCIM UI.
Alternatively, you can construct the URL manually:
https://{stack-name}.grafana.net/apis/scim.grafana.app/v0alpha1/namespaces/stacks-{stack-id}
{stack-name} and {stack-id} with your Grafana Cloud stack name and ID.https://{your-grafana-domain}/apis/scim.grafana.app/v0alpha1/namespaces/default
{your-grafana-domain} with your Grafana instance's domain (e.g., grafana.yourcompany.com).Secret Token: Enter the service account token from Grafana
After setting the Tenant URL and Secret Token, navigate to the Mappings section within the same Provisioning settings in your Entra ID enterprise application and then click Provision Microsoft Entra ID Users. This is where you will define how Entra ID attributes correspond to the SCIM attributes for Grafana, including the mandatory externalId.
{{< admonition type="note" >}}
emails[type eq "work"].value for email mapping.externalId attribute in Grafana is mandatory. Entra ID uses this to uniquely identify users and groups. You must map an attribute from Entra ID to the externalId attribute in Grafana. This Entra ID attribute must be a stable and a unique identifier for each individual user (for example, the objectId attribute in Entra ID is commonly used for this purpose).{{< /admonition >}}
Configure the following required attributes:
| Entra ID Attribute | Grafana Attribute |
|---|---|
userPrincipalName | userName |
mail | emails[type eq "work"].value |
displayName | displayName |
objectId | externalId |
Switch([IsSoftDeleted], , "False", "True", "True", "False") | active |
{{< admonition type="note" >}} During provisioning, if the identity provider sends user attributes that has no use in Grafana, those attributes will be gracefully ignored. {{< /admonition >}}
Click Start provisioning from the top action bar in the Overview page from your Entra ID enterprise application.
To enable group synchronization:
After completing the configuration: