Prerequisites
- A UserVoice plan that includes SAML Single Sign-On & SCIM
- UserVoice Admin with Owner Level Permission
- Azure access to provision apps
Enable in UserVoice
Note: Admins with owner-level permissions are the only admins able to enable and obtain the token.
To enable SCIM and fetch the required token:
- Navigate to the Admin Console → Click the settings cog in the lower-left nav → General Settings → User Authentication → Scroll down and toggle SCIM Provisioning on.
- Once enabled, click "Create Token" to obtain the API Token for configuring in your IdP. Copy or put this somewhere safe for use later.
Now you can start configuring SCIM in Azure.
Azure Configuration
Step 1: Create SCIM Application
- Sign into your Azure Entra ID platform and using the left-side navigation, navigate to Enterprise Applications → All Applications -> New Application.
- Give the Application a name and select Non-gallery
Step 2: Configure Provisioning
- On the Manage tab → Provisioning, set Provision Mode to Automatic
- Under Admin Credentials
- Tenant URL:
https://{your uservoice url}/api/scim_v2
- Secret Token: API Token created in "Enable in UserVoice" step
- Tenant URL:
- Click Test Connection and you should get a success
- Click Save at the top
- Set Provisioning Status to on
Step 3: Attribute Mappings
From the page you were on, scroll down and click Mapping, and go to Provision Azure Active Directory Users
- Target Object Actions → Create, Update, and Delete are checked
Here you will need to add licenseType
.
- Scroll down and check Show Advanced Options → Edit attribute list for customappsso
- Type → string
- Name → licenseType
- Save
-
Add new Mapping
- Mapping Type → Expression
- Expression → SingleAppRoleAssignment([appRoleAssignments])
- Target Attribute → licenseType
- Save
Note: If you do not configure licenseType
users will be provisioned as end-users by default. It is not required.
Step 4: App Roles
- Navigate to Microsoft Entra Admin Center → Applications → App Registrations → locate the app you created → App Roles
- Create App Role
- Display Name followed by Value. See the table here for what each value means:
- Full Access Owner → fullaccess_owner
- Admin → admin
- Admin No Settings → admin_no_settings
- Read Only Admin → readonly_admin
- Admin Ideas Only → admin_ideas_only
- Admin Feedback Only → admin_feedback_only
- Contributor → contributor
- Revoke Access → none
- Allowed member types set to Users/Groups
Step 5: Assign Roles
- Navigate back to Enterprise Applications → your application → Users and Groups
- Add user/group
- Assign Users to the roles created in Step 4
That completes the configuration.
Logs
If you encounter issues, Azure has logs that you can find in the Application screen and UserVoice has logs that you can find by navigating to Settings → Integrations → Integration Logs (at the very bottom of the page).