Skip to content

Microsoft Entra ID - SCIM

This guide outlines the steps for setting up automatic user provisioning between Microsoft Entra ID (formerly Azure Active Directory) and Wintro using SCIM 2.0. With SCIM configured, user accounts are automatically created, updated, and deactivated in Wintro based on changes in your Microsoft Entra ID.

Note: SCIM user provisioning is an Enterprise feature available on select Wintro plans. If your plan doesn’t include SCIM, please contact our sales team to upgrade.

Note: SCIM provisioning syncs every 40 minutes. Initial provisioning may take up to 40 minutes to reflect in Wintro.

Before starting the SCIM configuration, ensure you have:

  • Admin access to your Microsoft Entra ID tenant
  • Admin role in your Wintro organization
  • A Wintro plan that includes SCIM functionality (Enterprise plan)
  • Microsoft Entra ID Premium P1 or P2 license (required for provisioning)
  • Users in Microsoft Entra ID with complete profiles (email, first name, last name, display name)
  • Required fields for all users:
    • Valid email address (used as primary username)
    • First name (given name)
    • Last name (family name)
    • Display name
  • Users missing any required fields will fail to provision

Step 1: Create Enterprise Application for Provisioning

Section titled “Step 1: Create Enterprise Application for Provisioning”
  1. Sign in to the Microsoft Azure Portal
  2. Navigate to Microsoft Entra ID > Enterprise applications
  3. Click + New application
  4. Select Create your own application
  5. Configure the application:
    • Name: Enter “Wintro-SCIM” or “Wintro” (if using both SSO and SCIM)
    • Type: Select “Integrate any other application you don’t find in the gallery (Non-gallery)”
  6. Click Create

Enterprise Applications

Create Enterprise Application

Tip: If you’re implementing both SSO and SCIM, you can use the same application. Name it “Wintro” for clarity.

Before configuring provisioning in Azure, you need to generate a SCIM token in Wintro:

  1. Log in to Wintro as an Admin
  2. Navigate to Settings > Organization tab
  3. Scroll to the User Provisioning (SCIM) section
  4. Click Generate Token
  5. Copy and securely save this token - you won’t be able to see it again
  6. Keep this browser tab open while you configure Azure

Note: If you don’t see the SCIM section or see “Enterprise feature” with a “Contact Sales” button, your current plan doesn’t include SCIM. Please contact our sales team to upgrade to a plan that includes this functionality.

Step 3: Configure Provisioning in Microsoft Entra ID

Section titled “Step 3: Configure Provisioning in Microsoft Entra ID”
  1. In your Wintro enterprise application, navigate to Provisioning in the sidebar
  2. Click Get started
  3. Under Provisioning Mode, select Automatic
  4. Expand the Admin Credentials section and enter:
    • Tenant URL: https://www.wintro.app/api/scim/v2
    • Secret Token: Paste the token generated from Wintro
  5. Click Test Connection
  6. Wait for the success message: “The supplied credentials are authorized to enable provisioning”
  7. Click Save

Get started with application provisioning

New provisioning configuration

If the connection test fails:

  • Verify the Tenant URL is exactly: https://www.wintro.app/api/scim/v2
  • Ensure you copied the entire token from Wintro
  • Check that the token hasn’t expired (tokens are valid for 1 year)
  • Generate a new token in Wintro if needed

Microsoft Entra ID needs to know how to map user attributes to Wintro’s expected format.

  1. In the Provisioning section, click on Provisioning again to see the full configuration
  2. Under Mappings, click Provision Microsoft Entra ID Users
  3. Ensure the following attributes are mapped:
Microsoft Entra ID AttributeWintro AttributeRequired
userPrincipalNameuserNameYes
mailemails[type eq “work”].valueYes
givenNamename.givenNameYes
surnamename.familyNameYes
displayNamedisplayNameYes
Switch([IsSoftDeleted]…)activeYes

The “active” attribute requires a special expression to handle account states properly:

  1. Find the active attribute mapping
  2. Click on it to edit
  3. Set Mapping type to Expression
  4. In the Expression field, enter:
    IIF([IsSoftDeleted]="True", "False", IIF([accountEnabled]="False", "False", "True"))
  5. Click OK to save

Attribute Mappings

Edit Mapping

Edit Attribute

This expression ensures:

  • Soft-deleted users in Entra ID are marked as inactive in Wintro
  • Disabled accounts in Entra ID are marked as inactive in Wintro
  • All other users are marked as active

If your organization uses departments in Entra ID, you can sync them to Wintro. Department values typically flow into Entra automatically from your HR system (Workday, SAP SuccessFactors, BambooHR) or from on-premises Active Directory via AD Connect.

To enable department sync, add one additional attribute mapping:

  1. In the attribute mappings list, click Add New Mapping
  2. Configure the mapping:
    • Mapping type: Direct
    • Source attribute: department
    • Target attribute: urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department
    • Match objects using this attribute: No
    • Apply this mapping: Always
  3. Click OK, then Save

Wintro will automatically create departments as they arrive and assign users to them. You can verify the mapping works by using Provision on demand (under Provisioning) to test a single user that has a department value before running a full sync.

Step 5: Assign Users and Groups for Provisioning

Section titled “Step 5: Assign Users and Groups for Provisioning”
  1. Navigate to Users and groups in the application sidebar
  2. Click + Add user/group
  3. Select users individually or assign entire groups:
    • For individual users: Click None Selected under Users, search and select users
    • For groups: Click None Selected under Groups, search and select the groups you want to provision
  4. Click Select
  5. Click Assign

Tip: Using groups is recommended for easier management. All members of assigned groups will be automatically provisioned to Wintro. Note that only user data is synced - groups themselves are not created in Wintro, they are simply used to determine which users to provision.

Best practice: Create a dynamic security group in Microsoft Entra ID with rules that automatically include users who should have access to Wintro (e.g., based on department or job title). This way, new employees matching the criteria are automatically provisioned without requiring manual intervention from Microsoft admins.

Assign Users

Before assigning users, verify they have all required fields in Microsoft Entra ID:

  • Email address (mail attribute)
  • First name (givenName)
  • Last name (surname)
  • Display name (displayName)

Users missing any of these fields will fail to provision.

  1. Return to the Provisioning page
  2. Click Edit provisioning
  3. Expand the Settings section
  4. Configure the following:
    • Scope: “Sync only assigned users and groups”
    • Provisioning Status: Leave as “Off” for now
    • Email Notification: Enter your email for error notifications
    • Prevent accidental deletion: Enable and set threshold (e.g., 500)
  1. On the Provisioning overview page, click Start provisioning
  2. The initial sync will begin immediately
  3. Subsequent syncs occur every 40 minutes

Start Provisioning

  1. In the Provisioning section, click Provisioning logs
  2. Here you can see:
    • Successfully provisioned users
    • Failed provisioning attempts with error details
    • Update operations
    • Deactivation events
  • Create: New user created in Wintro
  • Update: Existing user information updated
  • Disable: User marked as inactive (account disabled or deleted in Entra ID)
  • Skip: User already exists and no changes needed
  • All assigned users are evaluated
  • New users are created in Wintro
  • Existing users (matched by email) are updated with Entra ID data
  • Takes up to 40 minutes for initial sync
  • Run every 40 minutes automatically
  • Only process changed users
  • Updates include:
    • Name changes
    • Email updates
    • Department changes
    • Account status (active/inactive)
  • Users are matched between systems using email address
  • Prevents duplicate accounts
  • Existing Wintro users get updated with Entra ID data

Check User Assignment

  • Verify users or groups are assigned to the application
  • If using groups, confirm the user is a member of an assigned group

Verify Required Fields

  • Check users have email, first name, last name, and display name in Entra ID
  • Review provisioning logs for specific field errors

Token Issues

  • Generate a new SCIM token in Wintro Settings > Organization if the current one expired
  • Update the token in Azure provisioning settings
  • Initial sync can take up to 40 minutes
  • Incremental syncs run every 40 minutes
  • Check provisioning logs for processing status
  • Large user volumes may take longer
  • Verify the active attribute expression is configured correctly
  • Check that account is actually disabled in Entra ID
  • Allow 40 minutes for sync to occur

This shouldn’t occur as matching is done by email. If you see duplicates:

  • Check if users have different email addresses in each system
  • Contact Wintro support for manual consolidation
  1. Test with a small group - Start with 5-10 test users
  2. Verify all attributes - Ensure names and emails sync correctly
  3. Check existing users - Confirm updates work for existing Wintro users
  4. Document your setup - Keep notes on token generation date and configuration
  • Monitor provisioning logs weekly for errors
  • Review inactive users monthly
  • Regenerate SCIM token annually in Wintro Settings > Organization (before expiration)
  • Audit user assignments quarterly
  • Protect SCIM tokens - Treat as passwords, never share in plain text
  • Limit admin access - Only users with Admin role in Wintro can manage SCIM settings
  • Enable notifications - Get alerts for provisioning errors in Azure
  • Regular audits - Review who has Admin access in Wintro and provisioning configuration in Azure

If you’re using both SSO and SCIM:

  1. Use the same app - One “Wintro” enterprise application for both
  2. Configure SSO first - Set up authentication before provisioning
  3. Test separately - Verify each works independently
  4. Coordinate rollout - Enable SSO, then add provisioning

After successfully configuring SCIM:


With SCIM configured, your user management is now automated. New employees will automatically get Wintro access, and departing employees will be deactivated, ensuring your Wintro user base stays synchronized with your Microsoft Entra ID directory.