Skip to main content

 

Eptura Knowledge Center

External group mapping for SCIM

This guide is for customers who have deployed the Eptura Engage SCIM compliant API to communicate with SCIM compatible systems providing user identity information, such as Azure Active Directory. Read the introduction and prerequisites.

Introduction

To manage which Eptura Engage groups the members of external groups have access to, we use Eptura Engage group profiles. Assign Eptura Engage group(s) to a profile and then map external group(s) to the Eptura Engage group profile.

External groups are imported from Azure Active Directory or another identity manager.

Add multiple Eptura Engage groups from multiple locations to a Eptura Engage group profile and set booking permissions for the external groups to the Eptura Engage groups. This applies explicit permissions for the members of the external groups, to the workspaces managed by the Eptura Engage group.

Before mapping external groups to Eptura Engage, you must complete the tenant onboarding process for SCIM.

Prerequisites

  • Completed SCIM tenant onboarding process.
  • Your Eptura Engage URL.
  • A Eptura Engage account with Admin privileges.
  • External groups mapping option enabled in Advanced setup. Learn how to enable external groups mapping