Certified: December 03, 2024
Solution Summary
This document describes Microsoft Entra ID integration with RSA Cloud Access Service’s (CAS) Unified Directory using SCIM.
Use Case
Microsoft Entra ID will serve as the SCIM client with CAS acting as a SCIM server, providing an endpoint for the SCIM client to connect to.
This integration will allow the administrators of Microsoft Entra ID to synchronize any changes performed to Microsoft Entra ID with the Unified Directory of CAS. Any CRUD operations (create, read, update, and delete) done on the users on the Microsoft side will automatically synchronize to the CAS without any manual intervention needed from the administrator side.
Configuration Summary
This section contains instruction steps that show how to configure Microsoft Entra ID with CAS Unified Directory using SCIM.
This document is not intended to suggest optimum installations or configurations. It is assumed that the reader has both working knowledge of all products involved and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products to install the required components.
All RSA and Microsoft Entra ID components must be installed and working prior to the integration.
CAS as a SCIM Server
This section describes how to configure CAS as a SCIM server for Microsoft Entra ID.
Configure CAS
Perform these steps to configure CAS as a SCIM server.
Procedure
- Sign in to the RSA Cloud Administration Console and click Users > Identity Sources > Add Identity Source.
- On the New Identity Source page, choose Azure Active Directory (SCIM).
- On the New Identity Source page, choose a name for the Identity Source and add an optional description. Take note of the SCIM Service Provider Base URI and the API Key that will be used in Microsoft Entra to complete the connection.
- Save the configuration and click Publish Changes.
Microsoft Entra ID as a SCIM Client
This section describes how to configure Microsoft Entra ID as a SCIM client for CAS.
Configure Microsoft Entra ID
Perform these steps to configure Microsoft Entra ID as a SCIM client.
Procedure
- Sign in to Microsoft Entra ID Admin Center and in the left pane, click Enterprise apps.
- On the Browse Microsoft Entra App Gallery page, click Create your own application.
- On the Create your own application window, choose a name for the RSA application and choose Non-gallery app.
- Click Create.
- Once redirected to the application page, in the Getting Started section, choose Provision User Accounts or navigate back to the newly created application homepage and choose Provisioning.
- Choose New configuration.
- On the New provisioning configuration page, in the Admin credentials section, use the SCIM Service Provider Base URI copied from step 3 in the previous section as the Tenant URL.
- In the Secret Token field, use the API key generated from step 3 in the previous section.
- Click Test connection.
You should get a notification that the test was successful. - Under the Manage section, navigate to Users and groups and assign the users who will be the scope of provisioning between RSA and Microsoft Entra.
- Once redirected to the provisioning screen, choose Provisioning under Manage in the left pane.
- Expand the Mappings section, click Provision Microsoft Entra ID Groups, and change the Enabled column value to No by disabling it.
- Go back to the Mappings section and click Provision Microsoft Entra ID Users.
- Enable Provision Microsoft Entra ID Users.
- Verify that the Target Object Actions options (Create, Update, and Delete) are selected.
This allows you to create users, update any of their attributes, and remove them from Microsoft Entra ID, which will synchronize with CAS. - In the Attribute Mapping section at the bottom of the page, map the attributes as shown in the following figure and click Save.
Click Edit or Delete for each attribute to edit or delete it. You can create new mappings between Entra ID and RSA. - Go back to the Provisioning page and make sure the Provisioning Status is turned on at the bottom of the page.
- By default, any changes made to users in Microsoft Entra ID are automatically synchronized with CAS every 40 minutes. If you need changes to take effect immediately, select Provision on demand in the left pane and enter the name of the user you want to sync. Ensure that the users you wish to synchronize are included on the Users and Groups tab.
The configuration is complete.
RSA Terminology Changes
The following table describes the differences in the terminologies used in the different versions of RSA products and components.
| Previous Version | New Version | Examples/Comments |
| Cloud Authentication Service | Cloud Access Service | |
| Token | OTP Credential | SecurID OTP Credential |
| Authenticator | Hardware Authenticator | |
| Tokencode | OTP | SecurID OTP, SMS OTP, Voice OTP |
| Access Code | Emergency Access Code | |
| SecurID Authenticate app | RSA Authenticator app | RSA Authenticator app for iOS and Android, RSA Authenticator app for Windows |
| Device | Authenticator | Register an authenticator |
| Company ID | Organization ID | |
| Account | Credential | |
| Device Serial Number | Binding ID |
Certification Details
CAS
Microsoft Entra ID
Known Issues
No known issues.
Related Articles
Microsoft Entra ID External Authentication Methods (EAM) - RSA Ready Implementation Guide 537Number of Views Microsoft Entra ID - RSA Ready Implementation Guide 244Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 499Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 186Number of Views Microsoft Entra ID Custom Controls - RSA Ready Implementation Guide 52Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle