Set up SCIM with Entra ID EnterpriseEnterprise +
dbt supports System for Cross-Domain Identity Management (SCIM) with Microsoft Entra ID for user and group provisioning and profile updates.
Automatic license type mapping is not currently supported with Entra ID SCIM. See mapped configuration to manage license types within the dbt platform user interface.
Prerequisites
- Available on Enterprise or Enterprise+ plans.
- You must use Entra ID as your single sign-on (SSO) provider and have it connected in the dbt platform.
- You must have permissions to configure the account settings in dbt platform.
- Complete setup SSO with Entra ID before configuring SCIM settings.
- Complete the Set up SCIM to get your SCIM base URL and token.
Set up Entra ID
- Log in to your Azure account and open the Entra ID configurations.
- From the sidebar, under Manage, click Enterprise Applications.
- Click New Application and select the option to Create your own application.
- Give your app a unique name and ensure the Integrate any other application you don't find in the gallery (Non-gallery) field is selected. Ignore any prompts for existing apps. Click Create.
- From the application Overview screen, click Provision User Accounts.
- From the Create configuration section, click Connect your application.
- Fill out the form with the information from your dbt account:
- The Tenant URL in Entra ID is your SCIM base URL from dbt.
- The Secret token in Entra ID is your SCIM token from dbt.
- Click Test connection and click Create once complete.
Attribute mapping
To map the attributes that will sync with dbt:
- From the enterprise app Overview screen sidebar menu, click Provisioning.
- Under Manage, click Provisioning again.
- Expand the Mappings section and click Provision Microsoft Entra ID users.
- Select the box for Show advanced options and then click Edit attribute list for customappsso.
- Scroll to the bottom of the Edit Attribute List window and find an empty field where you can add a new entry with the following fields:
- Name:
emails[type eq "work"].primary - Type:
Boolean - Required: True
- Name:
- Mark all of the fields listed in Step 10 below as
Required. - Click Save.
- Back on the Attribute mapping window, click Add new mapping and complete fields with the following:
- Mapping type:
none - Default value if null (optional):
True - Target attribute:
emails[type eq "work"].primary - Match objects using this attribute:
No - Matching precedence: Leave blank
- Apply this mapping:
Always
- Mapping type:
- Click Ok.
- Make sure the following mappings are in place and delete any others:
- UserName:
userPrincipalNameor the value you want users to leverage to log in to dbt. - active:
Switch([IsSoftDeleted], , "False", "True", "True", "False") - emails[type eq "work"].value:
userPrincipalNameis the most common, but this value needs to be the same set for UserName. - name.givenName:
givenName - name.familyName:
surname - externalid:
mailNickname - emails[type eq "work"].primary
- UserName:
- Click Save.
You can now begin assigning users to your SCIM app in Entra ID!
Assign users to SCIM app
The following steps go over how to assign users/groups to the SCIM app. Refer to Microsoft's official instructions for assigning users or groups to an Enterprise App in Entra ID to learn more. Although the article is written for Databricks, the steps are identical.
- Navigate to Enterprise applications and select the SCIM app.
- Go to Manage > Provisioning.
- To synchronize Microsoft Entra ID users and groups to dbt, click Start provisioning.
- Navigate back to the SCIM app's overview page and go to Manage > Users and groups.
- Click Add user/group and select the users and groups.
- Click the Assign button.
- Wait a few minutes. In the dbt platform, confirm the users and groups exist in your dbt account.
- Users and groups that you add and assign will automatically be provisioned to your dbt account when Microsoft Entra ID schedules the next sync.
- By enabling provisioning, you immediately trigger the initial Microsoft Entra ID sync. Subsequent syncs are triggered every 20-40 minutes, depending on the number of users and groups in the application. Refer to Microsoft Entra ID's Provisioning tips documentation for more information.
- You can also prompt a manual provisioning outside of the cycle by clicking Restart provisioning.
Was this page helpful?
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.













