Couchdrop Knowledge Base
Couchdrop HomepageDevelopersLogin
  • Welcome
  • Features
    • SFTP Server
      • Storage
      • Users
      • How to connect
      • Enabling FTPs
      • Host key authentication
    • Transfer Automations
      • Creating an Automation
      • Supported Actions
      • Variables
      • Troubleshooting
    • Shared Links
    • Upload Links
    • Inbound Mailboxes
    • Inbound Webhooks
    • File Actions
    • Inbound AS2 Stations
  • Administration
    • Users and Groups
      • User Roles
      • Creating Users
      • The Root Directory
      • Passwords and RSA Keys
      • Features Access
      • Firewalls and ACLs
    • Storage Connections
      • SharePoint
      • Azure Files
      • Amazon S3
      • Google Workspace
      • Google Drive
      • Box
      • Dropbox
      • Egnyte
      • Outbound AS2
      • External SFTP Server
      • Windows / Mac File Server
        • Server Requirements
        • Proxy Configuration
        • Non-GUI Environments
        • Running the Couchdrop Agent as a Service
        • Logging and Debugging
      • Others
        • OneDrive
        • Azure Blob
    • Folder Permissions
    • Alerting and Notifications
    • Custom Domains
    • SSO and Single Sign-on
      • SAML SSO
      • SCIM - Azure
      • SCIM - Okta
    • Security
      • Password Policies
      • Account Lockout
      • Account expiry
      • Two Factor Authentication
    • Other
      • Static IPs
      • Malware Scanning
  • Walkthroughs
    • Using SFTP Clients
      • OpenSSH SFTP
      • How to use SFTP with Cyberduck
      • How to use SFTP with FileZilla
      • Using SFTP with Golang
      • Using Python with SFTP
      • Using SFTP with Java
      • Using SFTP with Bash
      • Using SCP
    • SFTP To SharePoint
    • SFTP to Azure Files
    • Automated file transfers to SharePoint
    • Email Inboxes with Couchdrop
    • Delegating Domain-Wide Authority in Google Workspace
  • Other
    • FAQs
    • Trust/Security Center
    • Login to Couchdrop
    • API Documentation
Powered by GitBook

Couchdrop

  • Homepage
  • Register
  • Login

Platform

  • Cloud SFTP Server
  • Cloud FTP Server
  • Automated Transfers
  • Mailboxes and Inboxes

Copyright Couchdrop Limited 2025

On this page
  • Supported Features
  • Configuration Steps

Was this helpful?

Export as PDF
  1. Administration
  2. SSO and Single Sign-on

SCIM - Azure

Learn about configuring Couchdrop to sync with Azure for accounts

PreviousSAML SSONextSCIM - Okta

Last updated 2 months ago

Was this helpful?

Supported Features

  • Push Users Users created in Azure will also be created in Couchdrop

  • Push User Updates User updates in Azure will be pushed to the corresponding users in Couchdrop

  • User deactivation Users deactivated in Azure will be deactivated in Couchdrop

  • Push Groups Groups created in Azure will also be created in Couchdrop

  • Push Group updates Group updates in Azure will be pushed to the corresponding users in Couchdrop

  • Group deactivation Groups deactivated in Azure will be deactivated in Couchdrop

Configuration Steps

Create User Provisioning Token in Couchdrop

Navigate to in Couchdrop’s interface and create a new Provisioning Token. This will be used in the Azure Active Directory provisioning process.

Configure Enterprise Application in Azure Active Directory

Provide a name for the application and select “Integrate any other application you don’t find in the gallery (Non-gallery)

Next assign users and groups to the newly created application that you would like to have provisioned in Couchdrop.

Select Add user/group

Select the desired users or groups that should be provisioned through to Couchdrop then Select and Assign.

Configure SCIM provisioning between Azure Active Directory and Couchdrop

Select Test Connection and Azure will attempt to connect as well and vwill retrieve schema information needed for the user and group mapping. If tested successfully then select Save.

Configure user mapping

Select Provision Azure Active Directory Users as required.

Couchdrop requires the following user SCIM attributes for the SCIM system to be mapped, all others should be removed.

Custom Application SSO Attribute

userName

active

emails[type eq "work"].value

name.givenName

name.familyName

externalId

The externalId attribute may need to be remapped from mailNickname to objectId on the Azure Active Directory attribute side depending on your settings.

Configure group mapping

Select Provision Azure Active Directory Groups as required.

Couchdrop requires the following user SCIM attributes for the SCIM system to be mapped.

Custom Application SSO Attribute

displayName

externalId

members

Start the user and group provisioning process

Navigate back to the custom application breadcrumb (in this case it’s Couchdrop SCIM) and to Provisioning. From here select the Start provisioning button.

After the provisioning has completed running the first time a status should be required that indicates how many users and groups were provisioned within the Couchdrop product. Further information can be located by selecting View provisioning logs.

Navigate to your in Microsoft’s admin portal and create an enterprise application.

Navigate to the Provisioning Tab on the left hand side. Next select Get started to configure the tenant URL and the User Provisioning Token that was created in Step 1. Provisioning mode should be set to automatic. The Tenant URL is: .

Administration dashboard
https://api.couchdrop.io/scim/v2
User Provisioning