Troubleshooting SCIM provisioning with Microsoft Entra ID
If you are having any issues provisioning users from Microsoft Entra into Hyperproof, review the sections below for things you can do to troubleshoot the problem.
Connection test fails
In Microsoft Entra ID:
Verify that the SCIM Endpoint URL for Hyperproof is correct and has no trailing slashes.
Confirm that the Hyperproof Bearer Token was copied correctly.
See Configuring Microsoft Entra ID automatic provisioning for SCIM and Configuring SCIM in Hyperproof.
In Hyperproof:
Make sure that SCIM is enabled in Hyperproof.
Users are not being provisioned
In Microsoft Entra ID:
Ensure that Microsoft Entra ID users are assigned to the Hyperproof app. See Assigning Microsoft Entra ID users and groups for SCIM provisioning.
Make sure that Provisioning status is On. See Enable and verify Microsoft Entra ID SCIM provisioning.
Review provisioning logs. See Enable and verify Microsoft Entra ID SCIM provisioning.
Wait up to 40 minutes for the automatic synchronization to occur.
Force an immediate sync.
Sign in to the Microsoft Entra Admin Center.
Navigate to Entra ID > Enterprise apps.
Open the Hyperproof SCIM application you created. See Adding a Microsoft Entra non-gallery application for SCIM.
From the left menu, select Provisioning > Provision on demand.
Search for and select a user.
Click Provision .
Review the detailed sync results.
Incorrect roles
In Microsoft Entra ID:
Verify that app roles were created correctly. See Configuring Hyperproof roles for Microsoft Entra ID SCIM provisioning.
Confirm that the role mapping expression is configured. See Configuring Hyperproof roles for Microsoft Entra ID SCIM provisioning.
Ensure that users are assigned to the correct role in Users and groups. See Assigning Microsoft Entra ID users and groups for SCIM provisioning.
Role updates may take up to 40 minutes to sync.
Attribute mapping errors
In Microsoft Entra ID:
Ensure required mappings (userName, name.givenName, name.familyName, active, emails) are present. See Configuring Microsoft Entra ID attribute mappings for SCIM provisioning.
Verify source attributes contain valid data in Microsoft Entra ID.
Check that attribute names match Hyperproof's SCIM schema exactly. See Configuring Microsoft Entra ID attribute mappings for SCIM provisioning.