One of the major challenges in widespread adoption of Azure Active Directory (AD) has been the limited support for managing users and groups in on-premises applications. Although there has been an increase in cloud-only organizations, the majority of organizations still operate in a hybrid environment and rely on on-premises Line of Business (LOB) applications for managing their enterprises. While system administrators may eventually hope for a future where all enterprises are 100% in the cloud, it is important to recognize that this is still a work in progress.
The latest offering from Microsoft is a significant step forward in the right direction. With the now generally available functionality of provisioning to on-premises applications using Microsoft Entra Identity Governance for on-premises applications, IAM engineers have a powerful tool for designing and implementing user and group lifecycle management for on-premises applications.
The benefits of this new offering are numerous.
Here are few usecases,
In this multi-part blog series, we shall delve into the following aspects:
Microsoft offers a test application that enables you to construct your own System for Cross-domain Identity Management (SCIM) endpoint. We shall utilize this application to construct our own SCIM endpoint.
We will host the application in Azure App Services.
We will set up Azure AD On-Premises SCIM Application and set up provisioning.
We will Create Access Package and automatic assignment policy to assign the application to new hires (provisioning).
Create multi-staged access review to remove access for users who no longer require access to the application.
Microsoft Entra Identity Governance for on-premises applications provides a powerful tool for IAM engineers to design and implement user and group lifecycle management.
We will end the first part here. Stay tuned for the next post.