Crowd Using SCIM User And Group Provisioning For G-Suite
User Sync & Group Sync app provisions user and group information from G Suite to Crowd. Users, groups, and directory details can be provisioned using SCIM. SCIM provisioning works based on events performed on IDP. This way the administrator only needs to manage user accounts in G Suite. This reduces the administration time required to create users and groups in Atlassian modules such as Crowd.
Download and Installation
- Log into your Crowd instance as an admin.
- Navigate to the Administration menu and Click Manage Apps.
- Click Find new apps or Find new add-ons from the left-hand side of the page.
- Locate SCIM for Crowd via search and click on install.

Step 1: Get SCIM Client Details
- In the SCIM configuration, Please enter App Name and click on the Save Settings button. Copy the SCIM Base URL and SCIM Bearer Token, these will be used later to configure the SCIM application on G Suite .

Step 2: Setup G Suite SCIM Configurations
- Log in to Google API console with administrator privileges.
- Click on NEW PROJECT.
- Enter name for Your project and click on create.
- Now, select newly created project from drop-down.
- Click on ENABLE APIS AND SERVICES.
- Search for Admin SDK ,Now click on enable.
- Navigate to OAuth consent screen in the left panel.Select User Type External and enter app name User provisioning.
- Now, click on Credentials in the left panel.
- Select Create credentials ⇒ OAuth Cleint Id..
- Select Web application.
- Enter Authorized redirect URIs. Eg. <server-base-url>/plugins/servlet/usersync/callback. Replace <server-base-url> with your Atlassian module Server BaseURL.
- Now click on create.
- Copy Client ID and Client Secret.This will be required while Configuring User Sync app.









Step 3: User Sync Settings
- Select the User Sync Settings tab from the left sidebar. Here you can configure different settings about user creation and updation.
- You can Create the directory using Create Directory option where you want SCIM Operations to be performed.
- You can also select your Directory Type from the dropdown.
- Enable Import Users option to import all active Microsoft Entra ID (Previously known as Azure AD) Users.
- The user can be automatically enabled or disabled here based on IDP configuration.
- You also have the option to set Default Project Lead and Default Component Lead.
- Attribute mapping enables you to map your attributes sourced from the IDP to Crowd attributes. Through this section you can map your Crowd attributes to the attributes coming from IDP. By default, email corresponds to the email/mail attribute, and displayName corresponds to the full name attribute. However, if you want to map these Crowd attributes with other attributes coming from IDP, you can use this feature to change the attribute mapping configurations.



Step 4: Group Sync Settings
- Select the Group Sync Settings tab from the left sidebar. Here you can configure different settings for group creation and group mapping.
- Here you can configure Default groups for new and all users.
- You can set Manual Group Mapping or On-The Fly Group Mapping.

1. Manual Group Mapping -
- Here you can manually map Crowd groups with the groups from IDP.
- You can also configure to import IDP groups, and to keep existing users or not.

2. On-The Fly Group Mapping -
- Here users will be assigned to groups in Crowd whose group name is the same as groups from IDP. If the group doesn't exist in Crowd then it will be created.
- You can configure to keep the existing user groups.

Step 5: Backup & Restore
- In the Backup and Restore tab you can Import and Export plugin configurations in the JSON format.

Did this page help you?
