Auth0 can be integrated with Microsoft Azure Active Directory (now known as Microsoft Entra ID) with the Microsoft Azure AD connection type, which uses the Connect (OIDC) protocol for user authentication. These instructions are for new Azure AD connections; for older connections using pairwise user identifiers (sub), see Older Connections.
In the same section, enable Sync user profiles using SCIM.
Under the Mapping tab, ensure the SCIM attribute containing the User ID setting is set to externalId.
Review the Additional Mappings to ensure the extended SCIM attributes are mapped to your preferred Auth0 attributes. See attribute mapping for details.
Confirm that an OpenID Connect application has already been registered to handle user authentication in the Microsoft Entra ID > App registrations section of the Azure portal.
Confirm that your OpenID Connect application has Assignment Required set to Yes in the Microsoft Entra ID > Enterprise applications > [your-oidc-app] > Manage > Properties section, and has users assigned in the Users and Groups tab.
Next, register a new Non-gallery application in the Azure portal by browsing to Microsoft Entra ID > Enterprise applications > New application > Create your own application, entering an application name, and selecting Create.
Go to the Users and Groups tab and assign the same Azure AD users and groups that are assigned to the registered OpenID Connect app.
Select the Provisioning tab, select Get started, and choose Automatic as the Provisioning Mode.
Select Admin Credentials, then enter the SCIM Endpoint URL value you saved earlier as the Tenant URL. At the end of the URL, add ?aadOptscim062020 query parameter to fix known Azure AD issues described here.
Paste the token value into the Secret Token field and select Save.
Go to Mappings and select Provision Microsoft Entra ID Users, then go to Attribute Mappings and edit the attributes of the line containing externalId and mailNickname.
In the Edit Attribute screen, change Source attribute to objectId, then choose OK.
Go back to Attribute Mappings and select the line containing emails[type eq "work"].value and mail.
In the Edit Attribute screen, change Match objects using this attribute to Yes,thenset Matching precedence to 2 and choose OK. The attribute mapping screen looks like this as you continue to use the Attribute Mappings section to configure additional SCIM attributes:
Save the attribute mappings, then select X in the upper-right corner to return to the Provisioning screen.
On the Enterprise application overview screen, select Manage > Provisioning and then Provision on Demand to test the SCIM connection.
Go to Select a user or group and type the name of a user that you assigned to the application, then select the user and choose Provision. This creates the user in the Auth0 tenant.