How SCIM Works with KZero Passwordless
When SCIM is configured, Microsoft Entra ID triggers provisioning events, while KZero Passwordless receives and processes SCIM requests.
SCIM Provisioning Flow
User created in Microsoft Entra ID
↓
User assigned to the SCIM application
↓
Entra ID sends SCIM provisioning request
↓
KZero Passwordless receives the request
↓
User account is automatically created
↓
User authenticates using Passwordless Authentication
Step 1 — Enable SCIM Provisioning in KZero Passwordless
- Log in to the KZero Passwordless Dashboard
- Select the correct Tenant
- Navigate to Integrations → SCIM
- Select SCIM Endpoint
Configure the following values:
- Profile: Azure
- Azure Tenant ID: Enter your Microsoft Entra Tenant ID
- Enable: ON
- Click Update to save.
KZero Passwordless requires specific attributes to correctly interpret provisioning requests from Microsoft Entra ID.
Configure the required attributes in the Advanced Console.
Navigation
Open Advanced Console
Select Clients
- Search for scim-endpoint
- Open the client
- Go to the Client Scopes tab
- Select scim-endpoint-dedicated
- Click Add Mapper by Configuration
- Select User Attribute
You must create the following seven attributes:
- status
- loginName
- firstName
- manager
- lastName
- tag
- email
Attribute Configuration
Status
| Field | Value |
| Mapper Type | User Attribute |
| Name | status |
| User Attribute | isSoftDeleted |
| Token Claim | active |
| Claim JSON Type | Boolean |
Enable all token options (ID token, access token, userinfo, token introspection).
LoginName
| Field | Value |
| Mapper Type | User Attribute |
| Name | loginName |
| User Attribute | userPrincipalName |
| Token Claim | userName |
| Claim JSON Type | String |
Enable all token options (ID token, access token, userinfo, token introspection).
FirstName
| Field | Value |
| Mapper Type | User Attribute |
| Name | firstName |
| User Attribute | givenName |
| Token Claim | name.givenName |
| Claim JSON Type | String |
Enable all token options (ID token, access token, userinfo, token introspection).
Manager
| Field | Value |
| Mapper Type | User Attribute |
| Name | manager |
| User Attribute | manager |
| Token Claim | manager |
| Claim JSON Type | String |
Enable all token options (ID token, access token, userinfo, token introspection).
LastName
| Field | Value |
| Mapper Type | User Attribute |
| Name | lastName |
| User Attribute | surName |
| Token Claim | name.familyName |
| Claim JSON Type | String |
Enable all token options (ID token, access token, userinfo, token introspection).
Tag
| Field | Value |
| Mapper Type | User Attribute |
| Name | tag |
| User Attribute | extensionAttribute1 |
| Token Claim | urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:tag |
| Claim JSON Type | String |
Enable all token options (ID token, access token, userinfo, token introspection).
Email
| Field | Value |
| Mapper Type | User Attribute |
| Name | email |
| User Attribute | email |
| Token Claim | email |
| Claim JSON Type | String |
Enable all token options (ID token, access token, userinfo, token introspection).
Step 3 — Create the KZero Passwordless SCIM Application in Microsoft Entra ID
- Log into Microsoft Entra ID
- Go to Enterprise Applications
- Select New Application
- Click Create your own application
Use the following settings:
- Name: KZero Passwordless SCIM
- Application type: Integrate any other application you don't find in the gallery
ClickCreate.
Assign Users or Groups
In the new Enterprise Application:
- Go to Users and Groups
- Assign the users or groups that should be provisioned in KZero Passwordless
- Only assigned users will be provisioned.
Step 4 — Enable SCIM Provisioning in Entra ID
- In the Enterprise Application, select Provisioning
- Configure the following values:
- Provisioning Mode: Automatic
- Authentication Method: Bearer Authentication
- Tenant URL: https://ca.auth.kzero.com/realms/<TENANT_NAME>/scim/v2
- Click Test Connection. If successful:
- Set Provisioning Status to ON
- Click Save
Step 5 — Test SCIM Provisioning
To confirm the configuration is working:
- Create a new user in Microsoft Entra ID
- Assign the user to Enterprise Applications → KZero Passwordless SCIM
- Start provisioning from Overview → Start provisioning
- Verify the user appears in the KZero Passwordless Dashboard
Validation Checklist
Confirm the following before considering the integration complete:
- SCIM endpoint enabled in KZero Passwordless
- All required attribute mappings configured
- Enterprise Application created in Entra ID
- Users or groups assigned to the application
- Provisioning mode set to Automatic
- Connection test successful
- Test user successfully provisioned