Thanks for posting your question in the Microsoft Q&A forum.
To link OIDC users with SCIM, the best practice is to use a persistent, unique identifier that’s consistent in both OIDC tokens and SCIM provisioning data. For Azure AD, this is the ObjectId of the user, which appears in the OIDC oid claim.
Recommended approach:
- Map the SCIM
externalIdto the Azure AD ObjectId. - In your OIDC tokens, identify users by oid, not sub.
- For other identity providers, pick a tenant-wide, persistent identifier that works for both SCIM and OIDC
The sub claim is not reliable because it’s unique per application and should not be used for SCIM mappings
Please don't forget to close up the thread here by upvoting and accept it as an answer if it is helpful