Adding O365 Users to ShareDo

Manually adding O365 Users to ShareDo

To add your O365 users to ShareDo, open the application and go to the administration tool (Launchpad > Open Admin). Select “Users” and then “All” from the left-hand navigation – this will open the user list.

From the context ribbon, select “Add user”.

Fill in the details about the user as needed and then click the “User Account” navigation at the bottom of the blade.

Mark the user as active, and not locked. Make sure to select the “Identity Provider” configured in the earlier step and set the “Identity Claim” to the UPN of the user in O365 (this will be their O365 email address). Fill in the remainder of the form and click Confirm, then Save.

At this point the user should be put into relevant teams to grant access to ShareDo features.

Automatically provisioning O365 users to ShareDo

ShareDo supports the SCIM API and can be configured to accept provisioning requests from Azure Active Directory.

The following sections provide a guide on configuring ShareDo for automated provisioning of users and teams.

Register SCIM Client App

Within the ShareDo administration area, open the identity service management page. This can be found under Admin > Integrations > Manage Identity Service.

Select to Add App, and “Add client credentials application”

  • Enter a Client name – (i.e. [Client] SCIM)
  • Enter a Client ID – i.e. [Client]SCIM
  • Enter a Client Secret – you can select the Randomise option to generate a random key
  • Create a long-long lived access token – i.e. 5 years.

Next – open the client and select the option to provide you with a Bearer Token. You will need to provide this when configuring Azure AD.

Enable the SCIM Feature

Navigate to Global Features in ShareDo. Admin > Features > Manage global features

  1. Enable and configure the SCIM Feature
  2. Add a new Provider
  3. Configure the SCIM Provider
  4. Identity Provider - select the Identity Provider (e.g. Azure AD) that will be providing users to ShareDo.

USER CONFIGURATION

  • Default User Type - users added from your identity provider are given a ShareDo user type. This can be overridden by providing a mapping for a 'userType' from your AAD, but it is common for users to be added to a common low privilege user type.
  • Manager Connection - some identity providers hold an organisations hierarchy/reporting line. This can be reproduced in ShareDo, provided these users are also synchronised to ShareDo.

GROUP CONFIGURATION

Where groups are used as containers in the identity provider, these groups become teams in ShareDo. It is possible to assign permissions to these groups so that users in those groups have a basic set of ShareDo permissions.

The alternative is to assign specific user types to users on provisioning or through manual action. Assigning users to specific types will add them to teams that would then have appropriate permissions.

  • New Teams Organisation - Teams must belong to organisations. It is most common for teams to belong to your Organisation record.
  • New Team Ods Type - Teams may also have their own 'type'. ShareDo team types can be used for access control (ACL) or task allocation (POD). It is possible for AD groups to become teams within ShareDo, that are then used for task allocation or access control.

Create an Enterprise Application

These steps will require you to be an Azure AD Administrator.

  1. Access your Azure AD management portal.
  2. Select Enterprise Applications
  3. Select to add a new Enterprise Application
  4. Select to create your own application
  5. Provide an application name (i.e. [Client] – ShareDo – SCIM [environment]) and select to Integrate any other application you don’t find in the gallery.
  6. Select Provisioning
  7. Select Automatic Provisioning

Test the connection to ensure AAD can communicate with your ShareDo instance.

Configure Mapping

When provisioning requests are made to create or update users or group, the payload provided can be customised to map properties from AAD to named properties of the payload provided in these requests.

The provisioning feature allows you to configure this mapping.

If the below mapping is provided then additional attributes such as contact details will be added with these actions.

Users

Once this User payload reaches ShareDo, it is mapped to the following ShareDo schema attributes.

Note that the default mapping in Azure AD for mail (email) is set to provide this as: emails[type eq 'work']

This needs to be updated to map mail to: emails[type eq 'email']

 

The following table defines the mapping from the SCIM 2.0 to the ShareDo schema.

scim attribute ShareDo ATTRIBUTE NOTES
User Schema    
id ODS. SCIMId SCIM id is held in a custom attribute on the ODS record
username User.IdentityClaim  
Name.givenName Person.firstName  
Name.middleName Person.middleName  
Name.familyName Person.Surname  
Name.displayName Ods.ShortName  
Name.honorificPrefix Person.Title If the values cannot be mapped to the optionset then they are ignored
preferredLanguage Person.PreferredLanguage  
Locale Person.Timezone  
Active User Profile Active  
birthdate Person.dob  

Emails

Contact Details

Primary flag is used to indicate their primary email address.

Type should map to the contact types defined

phoneNumbers Contact Details Type should map to the contact types defined
Addresses Locations  
Groups Team Membership  
Roles Primary Team Role The first role passed will be set as the role on the primary team
Enterprise User Schema Extension    
employeeNumber ODS. Reference SCIM id is held in a custom attribute on the ODS record
Organisation User.Organisation  
Manager ODS Connections Creates a connection

Groups

When this payload reaches ShareDo it is mapped to the following ShareDo schema attributes.

Groups Schema    
externalId ODS. SCIMId SCIM id is held in a custom attribute on the ODS record
displayName Team.Name  
members Team Members List of team members

Enable Provisioning

When you configure the Enterprise Application for Provisioning, you will need to decide if you will synchronise the users and groups added to this Enterprise Application, or users and groups from the entire directory.

Sync only assigned users and groups

When you select users and groups added to this Enterprise Application, the provisioning feature will synchronise only the users and groups added to the users and groups area for this Enterprise Application.

Sync all users and groups

When you select the entire directory, the provisioning feature will synchronise all users and groups in Azure Active Directory.

Finally, you need to enable Provisioning

Testing your identity synchronisation configuration

Once configured, you can test your identity synchronisation configuration by creating users and groups in the directory or adding them to the Enterprise Application.

However, this process is not synchronous, and the background process does not provide immediate feedback on a provisioning request.

To address this, there is a feature within Azure AD to manually run the provisioning of a user or group on demand.

Selecting this option allows you to have Azure AD synchronise the user or group immediately.