Additional Microsoft Entra services and features related to identity, access, and network security
relevent document is not for salesforce
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
We are trying to setup SCIM in Microsoft Entra for Salesforce application so that we can auto provision users in salesforce once we added the user in a AD group. The SCIM Test connection is succesfull, but the users are not able to login to the Salesforce application and getting below error in Entra - Error code
SystemForCrossDomainIdentityManagementServiceIncompatibleFiltering
Error message
StatusCode: Conflict Message: Processing of the HTTP request resulted in an exception. Please see the HTTP response returned by the 'Response' property of this exception for details. Web Response: {"schemas":"["urn:ietf:params:scim:api:messages:2.0:Error"]","detail":"REQUIRED_FIELD_MISSING:user_must_have_one_entitlement_which_must_be_a_profileid;","status":409}
Can someone check the above logs and share your feedback - how can we resolve this issue?
Additional Microsoft Entra services and features related to identity, access, and network security
relevent document is not for salesforce
The SCIM endpoint is returning HTTP 409 with the Salesforce-specific error REQUIRED_FIELD_MISSING:user_must_have_one_entitlement_which_must_be_a_profileid. This means Salesforce is rejecting the SCIM request because the user being provisioned does not have a required profile/entitlement set in the payload.
From the Microsoft Entra side, the SCIM client is working (Test Connection succeeds), but the target SCIM service (Salesforce) is enforcing additional business rules beyond the base SCIM spec. To resolve this, the provisioning attribute mappings in the Salesforce enterprise app must be configured so that every provisioned user is sent a valid Salesforce profile/entitlement value.
Actionable steps:
entitlements, profileId, or a Salesforce-specific extension attribute). This must match what the Salesforce SCIM endpoint requires.If Salesforce still returns 409 after adding the mapping, review the Salesforce SCIM documentation or logs to confirm the exact attribute name and allowed values for the required entitlement/profile.
References: