Configuring User Provisioning with Other Identity Providers

User provisioning involves setting up and managing user accounts and access rights in different systems to make sure that users have the necessary permissions to do their tasks.

Important information

When you enable user provisioning in M-Files Manage, all the provisioned users first get the license that you set as the default license type for the provisioned users. This applies also if vault-level user synchronization has been previously used. This means that some users can temporarily get a lower license. You can specify the license type for each user group after the user groups have been provisioned.

Prerequisites

You must have the Subscription admin role in M-Files Manage.

Configuring User Provisioning in M-Files Manage

Tip: Microsoft Entra ID is the recommended method for user provisioning. However, it is also possible to provision users with any other identity provider that supports the SCIM protocol.

To configure user provisioning in M-Files Manage:

  1. Go to Provisioning > Configurations.
  2. In the top-right corner of the Configurations page, select Create configuration > Other SCIM provider.
  3. Enter the necessary information.
    1. In Configuration name, enter a unique name for the configuration.
    2. Select Default license type for the provisioned users. All the provisioned users first get this license. You can change a user group's license type to a higher one after user groups have been provisioned. If there are not enough available licenses of the default license type in the subscription, all the users do not get a license.
  4. Select Save.
    Result:M-Files Manage creates the tenant URL, client ID, and client secret for your configuration.
  5. Select the copy icon () for each piece of data, that M-Files Manage created, and note down the values.
    Note: The client secret is not shown anywhere else when you close the dialog.

Now that user groups are provisioned, you can use the values from the previous steps to configure your Identity Provider according to its specific instructions and guidelines.

Next, you must follow the next steps to create links between source and target groups, assign them to vaults, and select licenses.