Hello there!

Need Help? We are right here!

miniorange Support~
miniOrange Email Support
success

Thanks for your Enquiry.

If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com

Search Results:

×

AWS SCIM Automatic Provisioning and Deprovisioning


AWS SCIM Automatic Provisioning allows to create account in a simplified and automated way to link AWS user's account to their existing or new third party apps. AWS SCIM Provisioning automates user provisioning with their identities across the applications where users need access to. Enable automatic provisioning in Amazon Web Services (AWS) Identity center for users using Active Directory credentials.

Automated User Provisioning saves time when setting up new users and teams, and also manages access privileges through user lifecycle managemnet. miniOrange can create, read, and update user accounts for new or existing users, remove accounts for deactivated users, and synchronize attributes across multiple user stores.

AWS SCIM User provisioning and deprovisioning actions are bi-directional, so you can create accounts inside an external application and import them into miniOrange, or alternatively create the accounts in miniOrange and then push them out to any linked external applications.

AWS SCIM automatic Deprovisioning means deleting a user and removing their access from multiple applications and network systems at once. Deprovisioning action is triggered when an employee leaves a company or changes roles within the organization. The deprovisioning features increase your organization's security profile by removing access to sensitive applications and content from people who leave your organization.

Automatic Provisioning & Deprovisioning Scenarios for Amazon Web Services (AWS) Identity center


miniOrange provides Provisioning solutions for all scenarios of user management (provisioning), which includes AD Integration, LDAP Integration and automated provisioning for all External Applications such as AWS SCIM, Google Workspace, Workday, Salesforce, Microsoft apps, etc.



Follow the step-by-step guide given below to setup Automated AWS SCIM Provisioning

1. Setup Provisioning for AWS SCIM

  • Open the AWS SSO Console.
  • Choose Settings in the left navigation pane.
  • On the Settings page, under Identity source, next to Provisioning, choose Enable automatic provisioning. This immediately enables automatic provisioning in AWS SSO and displays the necessary endpoint and access token information.
  • In the Inbound automatic provisioning dialog box, copy each of the values for the following options. You will need to paste these in later when you configure provisioning in your IdP.
    a. SCIM endpoint
    b. Access Token
  • Choose Close.

2. Add SCIM Configuration for AWS application in miniOrange

  • Login into miniOrange Admin Console.
  • Click on Apps from the left-side navigation bar. Then click on Add Application.
  • miniOrange Admin Console showing Add Application button in Apps menu

  • In the Choose Application section, select Provisioning from All Apps dropdown.
  • miniOrange Provisioning App - Select Provisioning from dropdown

  • Search for AWS in the search bar and select the AWS Sync application.
  • Search and select AWS application in miniOrange provisioning apps

  • Under Basic Settings, enter Display Application Name and click Save to add the app.
  • Adding display name for AWS provisioning application

  • In the Authorization Configuration enter the SCIM Base URL and Bearer Token that you got in Step 1.
  • Click on Test Connection to verify details.
  • AWS Provisioning : Enter SCIM Base URL and Bearer Token

  • Then, click Save & Next button.

3. Attribute Mapping

  • Navigate to the Attributes Mapping tab in your AWS provisioning configuration.
  • Under this tab, you'll find two sections: Users and Groups, where you can map miniOrange attributes to AWS attributes for synchronization.
  • AWS SCIM Provisioning Add Attribute Mapping

    Users Mapping:

    Note: The userName, name.givenName, name.familyName, emails[type eq \"work\"].value, displayName and active fields are required for AWS SCIM integration.

    • In the Users section, map the attributes from miniOrange Attributes to the corresponding AWS Sync Attributes.
    • AWS SCIM Provisioning Users Attribute Mapping

    • Once all required mappings are configured, click the Save & Next button to proceed.

    Groups Mapping:

    Note: If you don't need group provisioning, skip this step.

    • Click on the Groups tab.
    • Click Add A Row to add a new mapping.
    • AWS SCIM Provisioning Switch to Group tab, click on Add A Row link

    • From the miniOrange Attributes dropdown, choose an attribute (like Group Name).
    • In the AWS Sync Attribute field, type the AWS attribute (like displayName).
    • AWS SCIM Provisioning Select miniOrange Attribute from dropdown

    • Click Save & Next when done.

4. miniOrange to AWS Sync

  • In the miniOrange to AWS Sync tab, there are two sections: Users and Groups. Each section contains a list of attributes and their functions when enabled. You can enable or disable them as needed. AWS SCIM Provisioning Enable appropriate option for users creation

    Attribute Description
    Users Create Users Enabling this option will create the user in the selected application upon user creation in miniOrange.
    Update Users Enabling this option will update the user profile in the selected application if updated in miniOrange.
    Delete Users Enabling this option will delete the user from the selected application if the user is deleted from the miniOrange.

    Attribute Description
    Groups Create Group Enabling this option will create the Group in the selected application upon Group creation in miniOrange.
    Delete Group Enabling this option will delete the Group from the selected application if the Group is deleted from the miniOrange.
    Add/Remove Group membership of User Enabling this option will add/remove the Group membership of a user from the selected application if the respective user group membership is updated from the miniOrange.
    Update Group Enabling this option will update the Group in the selected application upon Group updation in miniOrange.

    AWS SCIM Provisioning Enable appropriate option for groups creation

  • Click Save to apply these changes.

5. Create Group

To create a group, follow these steps:

  • Go to the Manage Groups section in the Groups tab, located on the left side and click on Create Group Button.
  • Click Create Group button in Manage Groups section for AWS provisioning

  • Enter the Group Name and click the Create Group button.
  • Add Group Name for AWS provisioning

  • You will be redirected to the Groups List Screen when you can see the newly created group.

6. App Policy (Provision Group to AWS Sync App)

  • Go to the App Login Policy section under Policies, and click Add Policy.
  • AWS Provisioning : Navigate to Policies and click App Login Policy

  • Select the application you configured in the Apps tab (for example: AWS).
  • Enter the Group Name you created (for example: AWSProvisioning).
  • Enter a Policy Name of your choice (for example: AWSProvisioningPolicy).
  • Click on Submit button to create a policy.
  • Adding App Login Policy for AWS provisioning

  • You will receive a success notification upon policy creation, and the policy will be displayed in the App Login Policy section of the Policies tab.
  • Provisioning configuration is complete now.
  • Now, we can verify whether provisioning is working as expected.
  • Go to the Manage Groups section under the Groups tab.
  • Locate the group you created (e.g., AWSProvisioning), click Select, and then choose Assign Users.
  • Selecting group and assigning users for AWS provisioning

  • Ensure that users are already present in miniOrange or import them into the user list. This allows you to assign the user you want to provision in AWS.
  • From the list below, select the user you want to provision, choose the Assign to Group option, and click Apply. This will automatically create the user in AWS services.

    Note: Assign users to a group that contains the authorized domain names for the configured application.

    To view the authorized domains, go to the Authorization Configuration section of the application you configured in the Apps tab.

    Only users whose email addresses match one of the authorized domains will be provisioned.


  • Select the users whose email addresses belong to an authorized domain, then click Assign to Group, and finally click the Apply button.
  • Selecting users and assigning them to provisioning group

  • Users are automatically created in AWS services.
  • To update a user, go to the User List, select the user you want to update, click Select, and then choose Edit.
  • Selecting a user from the user list to edit details

  • After updating the user, click the Save button. This will automatically update the user in AWS services.
  • Editing user details for provisioning in miniOrange portal

  • To delete a user, go to the Manage Groups section of the Groups tab. Then, navigate to the group from which the user needs to be deleted. In the Users column, click on the displayed number of users.
  • Manage Groups section showing user counts in groups

  • Select the user you want to delete, choose Remove from Group as the action, and click the Apply button. This will automatically remove the user from AWS services as well.
  • Removing a user from AWS provisioning group



View Provisioning Reports

How to access Provisioning Reports?

  • Navigate to Reports in the left-hand navigation pane, search for Provisioning, and select Provisioning Report.
  • Provisioning Report

  • Filter the reports by specifying Enduser Identifier and Application Name criteria. Additionally, choose the desired timespan for the reports. Once done, click on the Search.
  • Search Provisioning Report

  • Alternatively, you can directly click on Search to retrieve all provisioning reports based on time without applying any specific filters.


External References

Want To Schedule A Demo?

Request a Demo
  



Our Other Identity & Access Management Products