SCIM provisioning
Introduction
SigningHub now supports user provisioning through the System for Cross-domain Identity Management (SCIM) protocol. This industry-standard integration enables seamless, automated management of user identities between identity providers and SigningHub. With SCIM, administrators can create, update, enable, disable and delete user accounts directly from their identity management system, removing the need for manual user administration. This improves operational efficiency, enhances data consistency, and strengthens access security across connected platforms.
This use case outlines the complete configuration required to enable SCIM-based provisioning. It walks through all the key steps—from generating the SCIM endpoint and secret token to configuring the connection between the identity provider and the service, and managing user assignments. Currently, SCIM provisioning in SigningHub is supported exclusively through Azure Active Directory (Azure AD).
How it works?
Enable SCIM provisioning in SigningHub Web to activate automatic user syncing.
Configure the token expiry time in SigningHub Admin to define how long the SCIM token stays valid.
Authenticate using the API to obtain a SCIM-specific token.
Create an SCIM App in Azure Active Directory to initiate provisioning.
Create an App Role to manage role-based user assignments.
Test the connection between Azure AD and the SCIM client.
Configure provisioning settings and access mappings for the SCIM app.
Assign users and roles to the SCIM application in Azure AD.
Set the source scope to define which users are provisioned.
Map user attributes from Azure AD to the required SCIM fields.
Trigger on-demand provisioning to validate the configuration or sync instantly.
Enable SCIM Provisioning
Enable SCIM provisioning in SigningHub Web to ensure that users assigned to the SCIM app in Azure AD are automatically created in the enterprise with mapped roles.
Follow the steps below to enable SCIM provisioning:
Log in to the SigningHub Web portal with your enterprise admin credentials.
Click "Configurations" from the left menu and click "Users" under "People" options in the "Enterprise Configurations" section.
Tick the "Enable SCIM provisioning" check box.

Configure Token Expiry Time
To define how long the SCIM token remains valid, you can set the expiry duration from the SigningHub Admin. This ensures secure communication between SigningHub and external identity providers.
Follow the steps below to configure SCIM token expiry time:
Log in to the SigningHub Admin portal.
From the left-hand menu, click Configurations.
Click on Global Settings.
In the top-right dropdown, select Session and Links Expiry Time.
Locate the field for 'SCIM Token Expiry Time' and specify the number of days (i.e. 7) after which the SCIM token should expire.
Click on the 'Save' button to apply the new expiry duration.

'Authenticate' API
Follow the steps below to generate a SCIM-specific token using the 'Authenticate' API.
Generate an authentication token using the Client ID and Secret from your Enterprise Integration.
Save the SCIM token (received in response), it will be used in Azure AD to authenticate and test the connection to the SCIM endpoint.

Create an SCIM App in Azure Active Directory
Access the Azure AD portal and create an application using the following steps:
Sign in to the Azure portal using your Azure Active Directory administrator account, and click on 'Enterprise applications'.

Click on the "New application" button.

Click on the "Create your own application" button.

Enter the name for the app, select an option for your app via the radio button, and click on the "Create" button.

Create an App Role for the SCIM App
Define custom roles for your application using the following steps:
Select the 'App registration' option from the left panel.
Choose the created application for which you want to define the app role.
Click on 'App roles', and then the 'Create app role' button.

Specify the 'Display name', 'Allowed member types' and the 'Value' for the app role.

Test Connection with SCIM Client
After creating the SCIM app, follow the steps below to establish a connection with the SigningHub API:
In the application’s navigation pane (left side), click on Provisioning:
Enter the 'Tenant URL' (SCIM endpoint) and the 'secret token'.
Click the Test Connection button.

Configure Provisioning Settings and Access Mappings
Navigate to the 'Provisioning' section, and click on 'Mappings':
Set the 'Provisioning Mode' to Automatic.
Turn the 'Provisioning Status' to On.
Click on Provision Microsoft Entra ID Users to configure attribute mappings.

Assign Users and Roles to the SCIM Application
To ensure users are eligible for provisioning and are mapped correctly to enterprise roles, follow these steps:
In the left-hand menu, click on Users and groups.
Click on Add user/group.
In the Users section, select the user(s) you want to assign to the application.

In the Select a role section, choose a role created under the app (e.g., SigningHub_Admin, User, etc.).

Click Assign to complete the user-role mapping.

Set Source Scope for Provisioning
To define which users are eligible for SCIM provisioning, follow the steps below:
Navigate to Provisioning, then click on Provision Microsoft Entra ID Users, depending on your configuration.
Under Source Object Scope, set the value to All records. (This ensures that all assigned users are considered for provisioning.)

Optionally, apply a filter to include or exclude specific users from being provisioned.
SCIM User Attribute Mapping
User attribute mapping is a critical part of configuring SCIM provisioning. SigningHub requires a specific set of attributes to be mapped correctly from Azure AD.
Navigate to Provisioning, then click Provision Microsoft Entra ID Users to open the Attribute Mapping screen.
Delete all default mappings shown in the list.
Manually add the following attributes one by one:
SCIM Attribute (SigningHub)
Azure AD Attribute
Mandatory?
email[type eq "work"].value
mail
Yes
active
accountEnabled
No
title
jobTitle
No
userName
displayName
Yes
name.givenName
givenName
No
name.familyName
surname
No
phoneNumber[type eq "work"].value
mobile
No
roles[primary eq "True"].value
Custom expression
No
urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:organization
companyName
No

Trigger On-Demand Provisioning
Azure AD auto-provisioning runs every 40 minutes, which can delay testing or first-time setup. To speed up validation, use on-demand provisioning to manually trigger user or sync.
Follow the steps below to trigger on-demand provisioning:
Navigate to Provisioning, then click Provision Microsoft Entra ID Users.
Scroll down and click Provision on demand.
Search for a user and click Provision.

SCIM Provisioning Behaviour
The following table outlines how user account actions in Azure AD are automatically reflected in SigningHub through SCIM provisioning.
Azure AD Action
SigningHub Response
Description
New user added
User account is automatically created
A new SigningHub user is created based on the SCIM mapping.
User details updated
User details are automatically updated
Updates to fields like job title, company name, mobile number, or role are synced.
User account disabled
User account is automatically disabled
The user becomes disabled in SigningHub.
User account deleted
User account is automatically deleted
The corresponding SigningHub user is permanently removed.
Disabled user re-enabled
User account is automatically re-enabled
The previously disabled SigningHub user account is enabled.
Last updated
Was this helpful?




