Adding SCIM application in Azure
After generating a SCIM access token, you should create the SCIM application in Microsoft Entra ID so that admins can provision/deprovision users directly in Microsoft Entra and have those users automatically created, attributes edited, or disabled within Forcepoint Data Security Cloud.
Before you begin

To learn more about using SCIM with Azure AD, refer to the Microsoft Guide.
Steps
- On the left pane, navigate to Microsoft Entra ID > Enterprise Applications.
-
On the Enterprise Applications page, navigate to All applications > New application.
- On the Browse Microsoft Entra Gallery page, click Create your own application.
-
On the Create your own application dialog that appears on the right:
- Enter a recognizable application name.
-
Ensure Integrate any other application you don't find in the gallery (Non-gallery) is selected.
- Click Create. It may take a few moments for the app to be created.
-
On the resulting page, select Provisioning from the left pane or Get started from the 3. Provision User
Accounts tile and then select Get started to automatically create, update, and delete accounts when users join, leave, and move within your
organization.
-
On the Provisioning page, select Automatic from the Provisioning Mode drop-down.
-
Expand the Admin Credentials section:
- Copy the Base URL from the Admin > SCIM page in Forcepoint Data Security Cloud and paste it in the Tenant URL field.
- Copy the SCIM access Token that you generated during the SCIM token generation in Forcepoint Data Security Cloud and paste it in the Secret Token field.
- To test connection for entered Tenant URL and Token, click Test Connection.
-
To save the details entered, click Save.
Once you save, you will see options to configure users or groups are going to be provisioned as well as which attributes.
-
Under the Mappings section, adjust the user attribute properties match the users in your app.
- To open the Attribute Mapping page for users, click the Provision Microsoft Entra ID Users link.
-
Adjust the fields of user attribute mapping to match the following:
customappsso Attribute Microsoft Entra ID Attribute userName userPrincipalName active Switch([IsSoftDeleted], , "False", "True", "True", "False") displayName displayName title jobTitle emails[type eq "work"].value mail preferredLanguage preferredLanguage name.givenName givenName name.familyName surname name.formatted Join(" ", [givenName], [surname]) addresses[type eq "work"].formatted physicalDeliveryOfficeName addresses[type eq "work"].streetAddress streetAddress addresses[type eq "work"].locality city addresses[type eq "work"].region state addresses[type eq "work"].postalCode postalCode addresses[type eq "work"].country country phoneNumbers[type eq "work"].value telephoneNumber phoneNumbers[type eq "mobile"].value mobile phoneNumbers[type eq "fax"].value facsimileTelephoneNumber externalId objectId emails[type eq "home"].value otherMails name.middleName surname Note: Microsoft Entra allows to map only unique Target Attribute value with each Source attribute. For example, the Target Attribute drop-down will not display the externalid option as externalid is mapped to some other source attribute by default. So, you have to update the existing mapping of externalid. - Click Save on the Attribute Mapping page and click Yes on the Save Changes dialog.
-
Under the Mappings section of the Provisioning page, adjust the groups attribute properties match the groups in your app.
- To open the Attribute Mapping page for groups, click the Provision Microsoft Entra ID Groups link.
-
Adjust the fields of groups attribute mapping to match the following:
customappsso Attribute Microsoft Entra ID Attribute displayName displayName externalId objectId members members Note: Microsoft Entra allows to map only unique Target Attribute value with each Source attribute. For example, the Target Attribute drop-down will not display the externalid option as externalid is mapped to some other source attribute by default. So, you have to update the existing mapping of externalid. - Click Save on the Attribute Mapping page and click Yes on the Save Changes dialog.
-
Expand the Settings section of the Provisioning page:
-
To enable an email notification when a failure occurs, select the Send an email notification when a failure occurs checkbox.
- Enter an email to notify you if a failure occurs in the Notification Email field.
-
From the Scope drop-down, choose which users/groups are synced over.
- Sync all users and groups - Select this option to sync all users and groups to Forcepoint Data Security Cloud.
- Sync only assigned users and groups - Select this option to sync only assigned users and groups to Forcepoint Data Security Cloud.
- To save the details entered, click Save.
-
To enable an email notification when a failure occurs, select the Send an email notification when a failure occurs checkbox.
-
To only sync over specific users or groups, you will need to add them to the application.
-
In the left column, select Users and groups and then click Add user/group.
- On the Add Assignment page, select the Users and groups option to select the specific user(s) and/or group(s) that you want to provision.
-
Once you have made all of your selections, click Select at the bottom.
- Click Assign to assign selected users and groups to application.
-
In the left column, select Users and groups and then click Add user/group.
-
On the Provisioning page, turn the Provisioning Status to On to sync users and groups into Forcepoint Data Security Cloud.
- Click Save to start the synchronization of selected users and groups into Forcepoint Data Security Cloud.
Result
- Users in Admin > Users page
- Groups in Admin > Groups page
Next steps
- Now you are set to use Microsoft Entra ID as the IdP to login to Forcepoint Data Security Cloud.
- Now you can enforce users from the specific username domain to get authenticated by the selected Microsoft Entra ID IdP. To configure username domain, refer to Adding a new username domain.