Bitbucket SCIM User And Group Provisioning For Azure AD

User Sync & Group Sync app provisions user and group information from Azure AD to Jira, Confluence and Bitbucket. Users, groups and directory details can by provisioned using SCIM and REST API. SCIM provisioning works based on events performed on IDP. This way the administrator only needs to manage user accounts in Azure AD. This reduces the administration time required to create users and groups in Atlassian modules such as Jira, Confluence and Bitbucket.



Download And Installation

  • Log into your atlassian instance as admin.
  • Navigate to the settings menu and Click Manage Apps.
  • Click Find new apps or Find new add-ons from the left-hand side of the page.
  • Locate miniOrange User and Group Sync app.
  • Click Try free to begin a new trial or Buy now to purchase a license.
  • Enter your information and click Generate license when redirected to MyAtlassian.
  • Click Apply license.

Step 1: Get SCIM Client Details.

  • In the Configuration tab, please select Azure AD provider.
  • Select Azure AD as SCIM Provider
  • In the popup, please select SCIM method to perform user and group synchronization.
  • Select SCIM as Usersync method
  • In SCIM configuration, Please enter App Name and click on Save Settings button. Copy the SCIM Base URL and SCIM Bearer Token, these will be used later to configure SCIM application on Azure AD.
  • SCIM Configuration Details

Step 2: Setup Azure AD SCIM Configurations

  • Log in to your Azure AD portal and select the Azure Active Directory. Then create an Enterprise application.
  • User provisioning with Azure AD of SCIM Standard - Login to Azure AD portal
  • Click on New Application and select non-gallery application.
  • User provisioning with Azure AD of SCIM Standard - In Azure AD portal Add new application
  • Give suitable name to your user provisioning application.
  • User provisioning with Azure AD of SCIM Standard Applicaiton Name SCIM_User_provisioning
  • Click on Provisioning in left menu and click on Get started.
  • User provisioning with Azure AD of SCIM Standard- Provisioning screen to manage user account
  • Select Automatic in Provisioning Mode and Enter SCIM Base URL, SCIM Bearer Token (which you will find in step 1) .
  • User provisioning with Azure AD of SCIM Standard chose Provisioning Mode Automatic
  • Assign users to your applicartion. Assigned users will be created in your Atlassian module if they are not already present. You can also assign groups. Member of assigned groups will be provisioned for Atlassian module.
  • User provisioning with Azure AD of SCIM Standard Assign users and groups to application
  • Once done with configuration, Go back to application and click on Start provisioning.
  • User provisioning with Azure AD of SCIM Standard Start Provisioning option

Step 3: Setup Provisioning Options.

  • In this step,We will proceed with the Provisioning Operations' Configuration in Atlassian module.
  • Directory Selection Select the directory in which you want SCIM Operations to be performed. The Users/Groups from the selected directory will be updated via SCIM.
    Enable Import Users To import all active Azure AD Users.
    Regex on Username Enter the regex and replacement to change the username received from Cloud application. For eg: To transform demouser@gmail.com to demouser, enter (.*)@.* as regex and $1 as replacement.
    Enable Update Users If you wish to update existing User profile in Atlassian module.
    Enable Import User’s IDP Groups If you want to get the user groups from the Azure AD assign them to user in Atlassian module. Group filter can be used to filter out the groups by selecting the provided options before assigning to user.
    Enable Users If you wish to activate existing User in Atlassian module depending upon their status in Azure AD
    Disable Users If you wish to deactivate existing User in Atlassian module depending upon their status in Azure AD
    Select provisioning operations for Azure AD
  • Click on Save Settings.
  • Automatic provisioning will work as per provisioning scheduler on Azure AD.
  • Show successfully configured IDP


Our Other Apps: SAML SSO Apps | OAuth Apps | 2FA Apps | Crowd Apps | REST API Apps | Kerberos/NTLM Apps | User Sync Apps |
                             Bitbucket Git Authentication App | Jenkins SSO | SonarQube SSO

If you are looking for anything which you cannot find, please drop us an email on info@xecurify.com

Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com