Sync user accounts from your identity provider in Apple Business Manager (2024)

Sync user accounts from your identity provider in Apple Business Manager (1)

In Apple Business Manager, you can use OpenID Connect (OIDC) or System for Cross-domain Identity Management (SCIM) to sync user accounts from your identity provider (IdP). Using this system, you merge Apple Business Manager properties (such as roles) with user account data imported from your IdP. When you use SCIM to sync users, the account information is added as read-only until you disconnect. At that time, the accounts become manual accounts, and attributes in these accounts (such as user names) can then be edited. The initial sync takes longer to perform than subsequent cycles do. Consult your IdP’s documentation to learn how often they sync users to Apple Business Manager.

Important: You have only 4 calendar days to complete the token transfer to your IdP and successfully establish a connection, or you must begin the process again.

Before you begin

Before you sync to your IdP using an OIDC connection, you must do the following:

  • Configure and verify the domain you want to use. See Link to new domains.

  • Configure, federate, and enable a domain. See Use federated authentication with your identity provider.

  • Have on call an IdP administrator with permissions to edit settings.

Make sure you have the following information, then contact your IdP:

  • Unique identifier field for users: The value of this attribute is normally the email address of the user. This is used to create the user’s Managed Apple ID. For example, it may be userName.

  • Authentication method: SAML 2.0.

  • Authentication mode: OAuth 2.

  • Single sign-on URL: Consult your IdP’s documentation.

  • Authorization callback URL: Consult your IdP’s documentation.

IdP user accounts and Apple Business Manager

When a user is copied from your IdP using SCIM to Apple Business Manager, the default role is Staff.

Note: User groups from your IdP aren’t synced to Apple Business Manager. If you want the same groups, you can create new groups in Apple Business Manager and add users to them.

Sign-in attribute

Apple Business Manager requires that the attribute used for the Managed Apple ID be unique. This is normally the user’s email address. If a user has an attribute that’s exactly the same as an existing Apple Business Manager user with the role of Administrator, no syncing is performed and the source field remains unchanged.

Person ID

When an IdP user account is synced to Apple Business Manager, a Person ID is created for the Apple Business Manager user account. The Person ID is used to identify conflicting user accounts.

Important considerations if you modify the Person ID:

  • If you modify the Person ID for a user account previously imported from your IdP, that user account is no longer paired with the IdP.

  • If you modify the Person ID for a user account previously imported from your IdP and want to reconnect the user account, you must resolve the conflict.

Sign in to your IdP

  1. Sign in to your IdP as an administrator, then do one of the following:

    • Locate the app created by your IdP. You may be able to skip several steps in this task.

    • Navigate to where you can create an app or connection.

  2. Create the app with the following information:

    Important: Remember the name of the SCIM app because you may need it for the authorization callback URL.

    • Apple Business Manager: Use AppleBusinessManagerSCIM.

    • App type: Use SCIM.

    • Authentication method: Use SAML 2.0.

    • Single sign-on URL used for recipient and destination: Consult your IdP’s documentation.

    • Audience URI: Use Entity ID.

  3. Save the changes.

Configure the SCIM app provisioning settings

  1. Locate the provisioning section of your IdP SCIM app, then enter the following values:

    • SCIM connector base URL: https://federation.apple.com/feeds/business/scim

    • Access token URI: https://appleid.apple.com/auth/oauth2/v2/token

    • Authorization URI: https://appleid.apple.com/auth/oauth2/v2/authorize

    • Client ID: 123

    • Client secret: 123

      Important: Because you don’t yet know the actual SCIM Client ID and Client secret, 123 is used as a placeholder. You replace these values in a later task.

    • Authentication mode: OAuth 2.

    • Unique identifier field for users: Consult your IdP’s documentation.

      Important: Make sure you match the case of the identifier.

    • Supported provisioning actions:

      • Import new users and profile updates.

      • Push new users.

      • Push profile updates.

  2. Save the changes.

Create the authorization callback URL

You must create an authorized callback URL for Apple Business Manager to get user records from your IdP using SCIM. This callback URL is based on the name of the SCIM app you created in your IdP.

  1. Remember the name for your SCIM app. For example:

    • Apple Business Manager: AppleBusinessManagerSCIM

  2. Paste the app name inside the following URL. For example:

    • https://identity-provider.com/admin/app/AppleBusinessManagerSCIM/oauth/callback

  3. Save the authorization callback URL.

    You paste it into Apple Business Manager in the next task.

Create and copy SCIM client information to your IdP

  1. In Apple Business Manager Sync user accounts from your identity provider in Apple Business Manager (2), sign in with a user that has the role of Administrator or People Manager.

  2. Select your name at the bottom of the sidebar, select Preferences Sync user accounts from your identity provider in Apple Business Manager (3), then select Directory Sync Sync user accounts from your identity provider in Apple Business Manager (4).

  3. Select Enable next to Custom Sync.

  4. Paste in the authorization callback URL from the previous task, then select Create.

  5. Select SCIM Application, then select Create.

  6. Open a new text file or spreadsheet, then enter the following values from Apple Business Manager:

    • For the OIDC client ID, paste the SCIM client ID.

    • For the OIDC client secret, paste the SCIM client secret.

  7. Select Copy next to Client ID, then paste the client ID in the file.

  8. Select Client Secret, choose how long the secret should be active before it expires (6, 9, or 12 months), then paste the client secret in the file.

    Important: If you delete or forget the client secret before you paste it into your IdP SCIM app, you must create a new client secret.

  9. Select Done.

Paste the client ID and client secret in your IdP SCIM app and verify the connection

  1. Return to the provisioning section of your IdP SCIM app, then paste in the following values:

    • Apple Business Manager SCIM Client ID

    • Apple Business Manager SCIM Client secret

  2. Save the changes.

  3. If your IdP allows you to test authentication using an IdP administrator account, you can test it now. For example, there might be a button “Authenticate with [AppleSchoolManagerSCIM], [AppleBusinessManagerSCIM],[AppleBusinessEssentialsSCIM],” or whatever you named your SCIM app.

  4. Enter your IdP administrator name and password, then enter the two-factor authentication value.

  5. Read any authorization information carefully. If you agree, select Continue.

  6. If necessary, you can now enable federated authentication for this domain.

Your IdP and Apple Business Manager are now configured to sync specific user attribute changes from your IdP to Apple Business Manager.

See alsoUse federated authentication with your identity provider in Apple Business ManagerAbout the authorization callback URL in Apple Business ManagerResolve identity provider OIDC or SCIM sync user account conflicts in Apple Business Manager

Sync user accounts from your identity provider in Apple Business Manager (2024)
Top Articles
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 6017

Rating: 4.1 / 5 (52 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.