Provisioning setup - Azure AD (SCIM)


Splashtop supports users/groups provisioning from your identity provider via SCIM, please follow the below steps to set up.

Step 1: Configure Provisioning - Admin Credentials

  1. Go to the created SAML app, click Provisioning to set up.

    How to create a SAML app:
    Global stack: 
    EU stack:

  2. Add Admin Credentials.
    Enter -
    Tenant URL
    Global stack:
    EU stack:
    Secret Token: How to find my Secret token 
    Then click Save.
    Note: Need an active trial or subscription with SSO to successfully test

Step 2: Configure Provisioning - Set up ssoName attribute

  1. Go to Mappings, then Provision Azure Active Directory Users

    Note: Disable "Provision Azure Active Directory Groups" if a user is in multiple synced AD groups or you do not want users to be moved to the named AD group in Splashtop.

  2. Click on your_sso_method_name to configure.
  3. On the configuration window, insert below info:
    Constant Value: The SSO method name created on /
    Then Ok on the Edit Attribute window, then Save.

If you are from EU stack, you need to manually create the attribute following below steps.

a. Click on Provision Azure Active Directory Users. azuread_SCIM_2_en-us.png

b. Check Show advanced options, then click on Edit attribute list for customappsso. azuread_SCIM_3_en-us.png c. Add an attribute.
Name: urn:ietf:params:scim:schemas:extension:Splashtop:2.0:User:ssoName
Type: String
Required: Yesazuread_SCIM_4_en-us.png

d. Create the mapping:
Mapping type: Constant
Constant Value: Your SSO method name on
Target attribute: Select the attribute you just created (urn:ietf:params:scim:schemas:extension:Splashtop:2.0:User:ssoName)



Add user/group to the created app

After SSO and Provisioning configured, you can click Add user to add users to the created enterprise application so the users can be automatically provisioned.


Note: If you chose to provision groups, make sure a user is not in multiple groups that are being synced; otherwise, the user will repeatedly switch between groups in the Splashtop system.

Known issues / Troubleshooting

  1. The user xxx is skipped due to not assigned to the application:
    • Make sure the target user is assigned to the application created on Azure.
    • Check Source Object Scope (It is under Created application / Edit Provisioning / Mappings / Provision Azure Active Directory Users), and see if there are some filters preventing the users from being provisioned.
0 out of 0 found this helpful