Managing external identities to enable secure access for partners, customers, and other non-employees
Hello Navin!
The most common cause is because the user is assigned to the Enterprise App, but SCIM provisioning scope or assignment-based scoping blocks it—only users who are direct members of assigned users/groups (no nested groups) and meet required attributes (e.g., givenName, surname, userName) will be provisioned to AWS IAM Identity Center.
I think you should first confirm Provisioning = Automatic, Status = On, the SCIM token/endpoint is valid, and review Provisioning Logs for errors; then force an on‑demand provision for the user—AWS won’t receive the user until Entra provisioning successfully runs.