SCIM User Management for Microsoft Entra ID

This page details the configuration steps required to establish a connection between the SCIM Application in Microsoft Entra ID and Talkdesk. Please carefully review the following page before beginning the setup process: SCIM API


Creating the SCIM Application in OKTA

  1. Log in and go to Enterprise applications [1].

  1. Navigate to All applications [2] and then click New application [3].

  1. Click Create your own application [4].

  1. Give the application a name (i.e. “Talkdesk SCIM App”) [5], check the Integrate any other application you don’t find in the gallery (Non-gallery) option [6], and click Create [7].

Configuring the Provisioning

  1. Enter the application we created in the first step in Enterprise applications > All Applications > Talkdesk SCIM App.

  1. Navigate to Provisioning [1] and click on New configuration [2].

  1. Enter https://api.talkdeskapp.com/scim/v2 in the “Tenant URL” field [3].
    1. The base URL (i.e. api.talkdeskapp.com) is determined by your account instance's region. To view the available options, please check the following page: App and Talkdesk Regions
  2. Then, type in the STS generated token in the “Secret token” field [4]. For additional information on generating an STS Token, please visit this article.
  3. Click on Test connection [5] to ensure it works, and click on Create [6].

  1. Navigate to Attribute mapping (Preview) [7] and click on Provisioning Microsoft Entra ID Groups [8].

  1. Ensure groups mapping is Disabled [9] and click Save [10].

  1. Return to Attribute mapping and click on Provisioning Microsoft Entra ID Users [11].


  1. Ensure attribute mapping is Enabled [12] and specify which User operations should be synchronized with Talkdesk [13].
  2. On the same page, ensure that only supported fields are present in the Attribute Mappings [14] and click Save [15].
    1. For a comprehensive list of supported fields, please visit: Create User
    2. Some fields are mapped by default and need to be removed (i.e. Honorific prefix).
    3. The mandatory fields are userName, givenName, and familyName.

  1. Alternatively, to assign the active and externalId to the user during the SCIM Provisioning process, click on the Add New Mappings [16] link.

📘

Note

If the active field is not mapped, Talkdesk will try to create the user with active=true.

  1. For the active field, set the Mapping type to "Expression" [17], enter the code Switch([IsSoftDeleted], , "False", "True", "True", "False") in the Expression field [18], choose "active" as the Target attribute [19], and click Ok [20].

  1. For the externalId field, set the Mapping type to "Direct" [21], select “objectId” in the Source attribute field [22], choose "externalId" as the Target attribute [23], and click Ok [24].

  1. Alternatively, to assign the team and role to the user during the SCIM Provisioning process, enable Show advanced options [25] and then click Edit attribute list for customappsso [26].

  1. Scroll to the end of the page and create role and team attributes [27]. Use urn:ietf:params:scim:schemas:extension:talkdesk:2.0:User:rolesString for the role name and urn:ietf:params:scim:schemas:extension:talkdesk:2.0:User:teamsString for the team name. Configure both as String attribute types and click Save [28].

  1. Role and team values can be set through multiple methods (i.e. user custom attributes or application roles). For demonstration purposes, this guide uses constant values to populate these fields. Click on the Add New Mappings [29] link.

📘

Note

The rolesString value must contain a role name that already exists in your Talkdesk Account and has been previously created.

If the Role field is not mapped, Talkdesk will create the user with the default Role Agent.

📘

Note

The teamsString value must contain a team name that already exists in your Talkdesk Account and has been previously created.

If the Team field is not mapped, Talkdesk will not assign the user to any team.

  1. Set the Mapping type to "Constant" [30], enter the desired value in the Constant Value field [31], select the appropriate Target attribute [32], and click Ok [33].
    1. When configuring role field mapping through application roles, specify the expression SingleAppRoleAssignment([appRoleAssignments]) in the attribute mapping settings.

  1. To assign users to the application, navigate to Users and groups [34], and click on the Add user/group [35].

  1. Click the None Selected link [36], check [37] the desired users in the side panel, then click Select [38]. After adding all users, click Assign [39].

  1. Finally, navigate to Overview [40] and click Start provisioning [41].