Already a NinjaOne customer? Log in to view more guides and the latest updates.

NinjaOne SCIM: Using Microsoft Entra ID Groups to Create End User and Technician Accounts

Topic

This guide describes how to dynamically create NinjaOne technicians or end users via SCIM based on Microsoft Entra ID group membership.

Environment

  • NinjaOne Integrations
  • Microsoft Entra ID

Description

These steps outline the creation of Microsoft Entra ID User Roles, assigning those roles to Microsoft Entra ID Groups, and configuring SCIM to provision End User and Technician accounts within NinjaOne.

Before proceeding with user mapping, you'll need to configure Single Sign-On and SCIM. To learn how to do so, refer to our Login Security: Configure Single Sign-On in NinjaOne and NinjaOne Identity Management: Identity management with SCIM articles.

Select a category to learn more:

Create and Assign User Roles to Groups in Microsoft Entra ID

  1. Access the Microsoft Entra admin center and navigate to Applications → App registrations in the side navigation menu.
  2. Select the enterprise application created for Single Sign-On and SCIM with NinjaOne.

Figure 1: Applications → App registrations (click to enlarge)

  1. In the Manage flyout menu that opens, click App roles.
  2. Click Create app role.
  3. The Edit app role modal will open.

editAppRole.gif

Figure 2App roles → Create app role → Edit app role (click to enlarge)

  1. Configure the role as follows:
    • In the Display Name field, enter Technician for technician accounts or endUser for end-user accounts.

    • Set the Allowed member types to Both (User/Groups + Applications).

    • Copy the Display name you created into the Value field.

    • Input a brief description of the role's purpose in the Description field.
    • Select the check box below the Do you want to enable this app role? field.

The string you use to map resources requires either Technician or endUser to be present in the Display Name field. If the Display Name is not set to Technician, NinjaOne will create an end-user account by default. This step is not case-sensitive.
  1. In the Microsoft Entra side navigation menu, navigate to Applications → Enterprise applications.
  2. Select the enterprise application created for Single Sign-On and SCIM with NinjaOne.

enterpriseApplicationsAllApplications.gif

Figure 3App roles → Create app role → Edit app role (click to enlarge)

  1. In the Manage flyout menu that opens, select Users and groups.
  2. Select the check box of the target group for the desired role
If groups have yet to be added to the NinjaOne enterprise application, select Add user/group, select the target group, and select the desired role.
  1. Navigate to Edit Assignment.
  2. In the Select a role field, click None Selected.
  3. The Select a role modal opens. Click the check box for the role you'd like to assign.
  4. Click Select to save your changes.

selectARole.gif

Figure 4: Select a role (click to enlarge)

Provision and Map User Attributes

  1. Select Provisioning from the Manage flyout of the NinjaOne Enterprise Application.

enterpriseApplicationsProvisioning.gif

Figure 5: Enterprise applications → Provisioning (click to enlarge)

  1. Select Attribute mapping → Provision Microsoft Entra ID Users.
  2. Select the Show advanced options check box.
  3. Click Edit attribute list for customappsso.

customappssso.gif

Figure 6Advanced options (click to enlarge)

  1. Add a new attribute to the Edit Attribute list with the following characteristics:
    • Name: urn:ietf:params:scim:schemas:extension:ninjaone:2.0:User:userType
    • Type: String
    • Required: Not selected
  2. Navigate back to Provisioning → Attribute mapping → Provision Microsoft Entra ID Users.
  3. Select Add New Mapping and configure the fields as follows:
    • Mapping type: Expression
    • Expression: SingleAppRoleAssignment([appRoleAssignments]) When pasting, be sure not to include spaces on either side of this expression, or it will not work. 
    • Target attribute: urn:ietf:params:scim:schemas:extension:ninjaone:2.0:User:userType
    • Match objects using this attribute: No
    • Apply this mapping: Always

Figure 7Edit Attribute (click to enlarge)

Good to Know

To map end users to their correct organization, you'll need to add and configure the OrganizationID attribute. To learn how to configure this attribute, refer to the "map end users" section of our NinjaOne Identity Management: Identity management (SCIM) With Okta article. 

To create global end users, use All as the user's organization ID.

Group Mapping in NinjaOne

Once you've provisioned the group in Microsoft Entra ID, it will appear in the Group Mapping section of the Administration → Accounts → Identity Providers  page in the NinjaOne console. For further details about how to set up Group Mapping, review System for Cross-domain Identity Management (SCIM) with Okta

editIDP.gif

Figure 8Editing an identity provider (click to enlarge)

FAQ

Next Steps