![]() The Microsoft Entra provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. Step 4: Define who will be in scope for provisioning Learn more about adding an application from the gallery here. However, it's recommended that you create a separate app when testing out the integration initially. If you have previously set up Postman for SSO you can use the same application. Step 3: Add Postman from the Microsoft Entra application galleryĪdd Postman from the Microsoft Entra application gallery to start managing provisioning to Postman. For further information or help configuring SCIM, contact Postman support. To continue enabling SCIM provisioning, see Configuring SCIM with Microsoft Entra ID. Step 2: Configure Postman to support provisioning with Microsoft Entra IDīefore you begin to configure Postman to support provisioning with Microsoft Entra ID, you’ll need to generate a SCIM API token within the Postman Admin Console. Determine what data to map between Microsoft Entra ID and Postman.Determine who will be in scope for provisioning.Learn about how the provisioning service works.Step 1: Plan your provisioning deployment A user account in Postman with Admin permissions. ![]() ![]() A Postman tenant on the Enterprise plan.A user account in Microsoft Entra ID with permission to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).The scenario outlined in this tutorial assumes that you already have the following prerequisites: Single sign-on to Postman (recommended).Provision groups and group memberships in Postman.Keep user attributes synchronized between Microsoft Entra ID and Postman.Remove users in Postman when they do not require access anymore.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |