RemotePC

    Menu

    • My Account
    • Login
    • Sign up
    • Features
    • Pricing
    • Download

    Provisioning setup - Azure AD (SCIM) with RemotePC™

    Related Links
    • Single Sign-On
    • Set up SSO
    • Enabling SSO
    • Accessing SSO
    • Create your own IdP
    • Generate SCIM Token
    • FAQs
    • SSO via IdP
    • SSO via OneLogin
    • SSO via Okta
    • SSO via Keycloak
    • SSO via Azure AD
    • SSO via G-Suite
    • Active Directory Sync (IdP sync)
    • IdP Sync via OneLogin
    • IdP Sync via Okta
    • IdP Sync via Azure AD
    • IdP Sync via Azure (Non Gallery Application)

    Single Sign-On provisioning setup - Azure AD (SCIM)

    Admin of the RemotePC Team and Enterprise accounts can now set up provisioning for their users / groups from the identity provider. RemotePC supports SCIM (System for Cross-domain Identity Management) provisioning method to provision users / groups.

    To setup Single Sign-On (SSO) provisioning with Azure AD, the admin needs to:

    • Generate SCIM provisioning token with RemotePC account
    • Configure SCIM provisioning
    • Assign users / groups to the provisioned app
    Generate SCIM provisioning token with RemotePC account

    Admin needs to generate and use the SCIM (System for Cross-domain Identity Management) provisioning token to sync all the users linked with their IdP to the RemotePC account.

    To generate a token,

    1. Log in to RemotePC via web browser.
    2. Click the username displayed on the top-right corner and click 'My Account'.
    3. Navigate to the 'Single Sign-On' tab and click the 'Generate Token' button under 'Sync users from your identity provider' to generate a token.

      RemotePC
    4. Click the 'Copy Token' button to copy and save the token for future reference.

      RemotePC
    Configure SCIM provisioning

    Once the app is created, admin can configure their account for SCIM provisioning.

    To configure SCIM provisioning,

    1. Login to the Azure AD console using your Azure AD account credentials and click on 'Enterprise applications'.
    2. Click on the newly created application, and select 'Provisioning' tab on the LHS.

      RemotePC
    3. Click the 'Get Started button' and choose 'Automatic' from the drop-down that appears.

      RemotePC
    4. Click on 'Admin Credentials' tab and add below details:
      • Tenant URL: https://sso.remotepc.com/scim
      • Secret Token: Enter the SCIM provisioning token generated on your RemotePC account
    5. Click 'Save'.

      RemotePC


    Assign users / groups to the provisioned app

    To enable provisioning for users / groups, admin needs to assign users / groups to the SCIM app created on Azure AD console.

    To assign users / groups,

    1. Navigate to the Azure AD admin console, and click 'Azure Active Directory'.

      RemotePC
    2. Select the 'Users' tab on the LHS and click '+ New user' to add a new user. Similarly, to add a new group select the 'Groups' tab and click '+ New group'.

      RemotePC
    3. Once the user / group is created, go to the 'Enterprise Applications' from Azure AD console and click on the created app.
    4. Navigate to the 'Users and groups' tab and click the '+ Add user/group' button.
    5. Search for the user / group you wish to assign to the app, and click 'Assign'.

    Once assigned, the users / groups will be provisioned automatically.

    Alternatively, to provision user accounts on priority,

    1. In the application, go to the 'Provisioning' tab and click 'Provision on demand'.

      RemotePC
    2. Search the user account you wish to provision, and click 'Provision'.

      RemotePC

      A success message will be displayed once the user account is provisioned.

    Learn how to create a Non-gallery application in Azure AD console >

    • RemotePC™

    • Features
    • Pricing
    • Team
    • Enterprise
    • Access via Web
    • Access via Mobile
    • Corporate
    • Get Started

    • Download
    • Sign up
    • FAQs
    • Video Tutorials
    • Services

    • Partners
    • Compliance
    • Legal

    • Terms of Service
    • Privacy Policy
    • Acceptable use Policy

    Support


    © IDrive Inc.