Configuring Hyperproof roles for Microsoft Entra ID SCIM provisioning
You must be logged in to Microsoft Entra using one of the following roles: Application Administrator, Cloud Application Administrator, or Global Administrator.
To automatically assign Hyperproof roles to users during provisioning, you must create app roles in Microsoft Entra ID.
Sign in to the Microsoft Entra Admin Center at https://entra.microsoft.com.
Navigate to Entra ID > App registrations.
Open the Hyperproof SCIM application you created. See Adding a Microsoft Entra non-gallery application for SCIM.
From the left menu, select App roles.
Click + Create app role as needed to create each of the following roles:
Role: Organization Administrator, complete the following fields:
Display name -
AdminAllowed member types - Users/Groups
Value -
ORGANIZATION_ADMINISTRATORDescription - Full administrative access to create and manage programs, controls, and settings.
Enable this app role - Checked
Role: Compliance Manager, complete the following fields:
Display name -
Compliance managerAllowed member types - Users/Groups
Value -
COMPLIANCE_MANAGERDescription - Full access to create and manage programs and controls.
Enable this app role - Checked
Role: Limited access user
Display name -
Limited access userAllowed member types - Users/Groups
Value -
LIMITED_ACCESS_USERDescription - Read-only access to assigned objects; can create work items and upload proof.
Enable this app role - Checked
Click Apply after creating each role.
Click the existing User role and update the following values:
Allowed member types - Users/Groups
Value -
USERDescription - Can work on assigned tasks and controls
Click Apply after editing this role.
Mapping roles to SCIM in Microsoft Entra ID
Sign in to the Microsoft Entra Admin Center at https://entra.microsoft.com.
Navigate to Enterprise apps.
Open the Hyperproof SCIM application you created. See Adding a Microsoft Entra non-gallery application for SCIM.
Select Provisioning.
Select Attribute Mapping.
Select Provision Microsoft Entra ID Users.
Scroll to the bottom and click Add New Mapping.
Configure the mapping as follows:
Mapping type - Expression
Expression -
SingleAppRoleAssignment([appRoleAssignments])Target attribute -
roles[primary eq "True"].valueApply this mapping - Always
Click OK.
Click Save.
For information on the entire workflow for configuring SCIM provisioning, see Microsoft Entra ID SCIM Configuration.