Before you start your configurations, ensure that you have an Azure AD premium account with administrator permissions:
To configure Azure AD:
Create a new application.
Log in to Azure Portal with your Azure AD admin credentials.
Select Microsoft Entra ID.
From the left panel, select Manage and expand it.
Select Create your own application.
Specify a name for the application and choose to integrate any other application you do not find in the gallery.
Select Create.
Enable SCIM provisioning.
On the All Applications page, select the application name.
On the Properties page, from the left panel, select Manage and expand it.
Select Provisioning.
On the Overview page, from the left panel, select Manage > Provisioning.
In the Admin Credentials section, type the SCIM Endpoint URL of the OpenText Identity Governance server and the unique identifier. Use the following format:
https://igurl/api/scim/UNIQUE_IDENTITY_SOURCE_ID
Generate the bearer token using a script or a tool such as Insomnia, then enter the token in the Secret Token field.
Test the connection to ensure that it is successful.
Configure attribute mapping to map user attributes between Azure AD and OpenText Identity Governance.
(Optional) In the Mappings section, click the provision link for users and groups to edit the default mappings.
Azure AD provides predefined mappings for common attributes such as userPrincipalName, email, firstName, or lastName.
(Optional) Click Add New Attribute.
Provision users on demand.
Select Provision on demand for manual provisioning.
Search for an existing user or group and select the user.
Click Provision.
To validate whether users and groups are provisioned, log in to OpenText Identity Governance and navigate to Catalog > Identities or Groups.
NOTE:When provisioning users or groups, the process can take up to 40 minutes, while the bearer token is valid for only 10 minutes. Hence, we do not support automatic mode of provisioning.