CGR Foundation SCIM2 Integration Guide

Modified on Wed, 22 Oct, 2025 at 12:48 PM

CGR Foundation supports automatic user and group provisioning through SCIM2 (System for Cross-domain Identity Management) integration with identity providers. This guide covers configuration for Microsoft Entra ID (Azure AD).


TABLE OF CONTENTS


Prerequisites

Before beginning the SCIM2 configuration, please ensure:

  1. Contact CGR Support at support@corpgovrisk.com to:
    - Generate a SCIM authentication token
    - Receive your organisation's SCIM endpoint URL
    - Discuss your user identifier strategy
  2. Understand Identifier Selection: The identifier you choose for user accounts is critical for seamless integration between auto-provisioning and Single Sign-On (SSO).
  3. Admin Access: Ensure you have administrator access to your identity provider

Set Up

Entra ID

From the Microsoft Entra ID home page navigate to:
AddEnterprise ApplicationCreate your own applicationName: CGR FoundationCreate



After this go to:
ProvisioningConnect your Application




And insert the Tenant URL and Secret Token as given on the set up on the CGR side.

 



Click on Test Connection to ensure everything is working.


CGR Foundation

Head to the page /admin/provisioners and edit an existing configuration or create one.



Below are some explanations for the fields

  • Configuration Type: set to SCIM2.
  • Position: only refers to the ordering of the list at /admin/provisioners
  • Active: should be true
  • Contacts: a list of emails
  • Notify on failure: if set to Yes, a csv of any failed users will be created and sent to the list of contacts
  • Sync users: has 3 options
    • Do not sync: effectively turns off provisioning on foundation end
    • Update only: only allow previously existing users to be updated through provisioning
    • Create and update: allow users to be both created and updated through provisioning
  • Bind roles: has 3 options
    • Do not bind roles: ignore role management completely
    • Create roles: for every new user, create a corresponding role in CGR if no role is already bound
    • Find or create roles by position: assign roles based on position ID, expanded on in Role Mapping via Position ID
  • Enable notifications on new users: set Yes if you want provisioned users to have notifications enabled by default, No otherwise
  • Default project/location/user type: set the defaults on created users for each respective attribute


Configuring Attribute Mappings

Entra ID

Under ManageAttribute mapping will be a link to Provision Microsoft Entra ID Users



Ensure you disable Provision Microsoft Entra ID Groups.


This page depends on your specific configuration as well as your CGR Foundation's configuration. A good place to start is to delete the attribute you definitely do not need to be provisioned and add any ones you do.


A special case is roles/positions and will be expanded further in Role Mapping via Position ID.



CGR Foundation

Similar as to above, this depends on your specific configuration as to how attributes should be mapped. Below is an example of one possible set of Attribute Mappings.



Sync Strategy and Scoping Users

Under ManageProvisioning Settings

There is a Scope that can allow you to allow sync certain users.



You can then navigate to ManageUsers and groups to add these select users.



Finally we can click the Start provisioning button at the top.



Role Mapping via Position ID

CGR Foundation supports automatic role assignment based on position identifiers from your identity provider. This feature allows you to maintain role-based access control that automatically updates when users change positions.


How It Works

When a user's position ID is synchronised via SCIM:

  • if a role exists with a matching external ID, the user is assigned to that role
  • if no matching role exists, a new role is automatically created
  • the role's title is set from the user's job title
  • when a user's position changes, they are automatically moved to the new role


Entra ID

Navigate to Attribute mapping (Preview) Provision Microsoft Entra ID Users.



Click Show advanced options and then Edit attribute list for customappsso.



Add an attribute to the list with Name urn:cgr:params:scim:schemas:extension:custom:2.0:User:positionId and Type String, then click Save.



On the Attribute Mapping page, click Add New Mapping.



Choose the attribute you want to map to urn:cgr:params:scim:schemas:extension:custom:2.0:User:positionId (e.g. extensionAttribute5).



Once the attribute has been mapped, ensure the changes are saved.



You may need to manually Restart provisioning or Provision on demand to ensure the newly mapped attribute is pushed to CGR Foundation.


CGR Foundation

All that is required for Foundation to accept roles thorugh positionID is to ensure the Bind roles attribute is set to Find or create roles by position.


Viewing Logs

You can view the provisioning logs in order to debug any potential issues on both the Entra ID side and the CGR Foundation side.

Entra ID

Under OverviewMonitoringView Provisioning Logs.



CGR Foundation

On the Admin Provisioners page there is a panel for notices which contain any failures with error messages for debugging.



Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article