There is an AWS IAM/AWS SSO application in the Enterprise App Gallery - use that rather than the generic SCIM connector. It is configured to work with the AWS SCIM service without requiring adjustments to the configuration that using the generic SCIM connector will require.
Azure SSO with AWS has some issues
we built Azure integration with AWS console by creating new app inside the enterprise application in azure and we started assigning users to this newly created enterprise application. We noticed that very few users were synced to AWS and then stopped with a failure. When we used provision on demand we can see in the logs the following error:
Provision urn:ietf:params:scim:schemas:extension:enterprise:2.0:User in customappsso
can somebody assist in resolving this issue?
Microsoft Security | Microsoft Entra | Microsoft Entra ID
2 answers
Sort by: Most helpful
-
Danny Zollner 10,801 Reputation points Microsoft Employee Moderator
2024-05-08T13:43:50.19+00:00 -
Kotesh Dundigala 0 Reputation points
2024-05-08T11:59:35.0066667+00:00 Hi Fadi,
Check the user attributes for the failed users, Mandatory attribute values should be present in the AAD for the failed users.
Compare both the provisioned and failed users to get the conclusion.