Skip to main content
Version: Next

SCIM Integration: MS Entra and DataHub

Feature Availability
Self-Hosted DataHub
Managed DataHub

Overview

On completion of this setup the MS Entra will automatically manage the groups/users/roles from MS Entra to DataHub.

Consider following configuration in MS Entra

  • A group governance-team group
  • And it has two memeber john and sid
  • And the group has role Reader

If you configure the governance-team for auto provisioning, MS Entra will creates the governance-team group and it's member automatically on DataHub and set the Reader roles on users.

If you remove john from group governance-team then MS Entra will automatically removes the john from DataHub's governance-team group.

If you permanently deletes a user or group from MS Entra then MS Entra will automatically deletes the user or group from the DataHub.

MS Entra doesn't send the user's password on user creation and hence DataHub Admin need to reset their password to be able to login into the DataHub.

Only Admin, Editor and Reader roles are supported in DataHub. These roles are preconfigured/created on DataHub

Configuring User/Group/Roles provisioning from MS Entra to DataHub

  1. Generate Personal Access Token: Generate a personal access token from DataHub.

  2. Integrate DataHub With MS Entra: Follow steps Integrate your SCIM endpoint with the Microsoft Entra provisioning service to integrate DataHub SCIM endpoint into MS Entra.

    a. Set the Tenant URL to https://<hostname>/gms/openapi/scim/v2. Replace <hostname> with your DataHub instance hostname.

    b. Set the Secret Token to Personal Access Token created in Step 1.

  3. Update Attribute Mapping For Role:

    a. Go to Provisioning section inside the App and click on Provision Microsoft Entra ID Users as shown in below image

    b. Click on Add Mapping

    c. Fill detail as shown in below image

    Fill listed fields

    • Set Mapping type to Expression
    • Set Expression to SingleAppRoleAssignment([appRoleAssignments])
    • Set Target attribute to roles[primary eq "True"].value
    • Set Match objects using this attribute to No
    • Set Apply this mapping to Always

    d. Create Role: Go back to the app created in Step #1 and go to the Provisioning section and click on application registration. to create the role

    Create three roles having Display Name and Value as mentioned below

    • Admin
    • Editor
    • Reader

    Only these three roles are supported in DataHub.

    e. While creating the App Role set Allowed member types to Users/Groups

  4. Add Users/Groups/Roles in the App: Go to application created in step #1 and click on Add user/group as shown in below image

    On the screen choose

    • Group/User
    • And role for the Group/User. The role should be one of the role created in Step 3