Skip to content

Commit 6d90f18

Browse files
authored
Merge pull request MicrosoftDocs#31490 from ArvindHarinder1/patch-34
Update use-scim-to-provision-users-and-groups.md
2 parents 490a252 + 2fe24b8 commit 6d90f18

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/active-directory/manage-apps/use-scim-to-provision-users-and-groups.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1344,6 +1344,9 @@ Group resources are identified by the schema identifier, `urn:ietf:params:scim:s
13441344
| objectId |ID |
13451345
| proxyAddresses |emails[type eq "other"].Value |
13461346

1347+
## Allow IP addresses used by the Azure AD provisioning service to make SCIM requests
1348+
Certain apps allow inbound traffic to their app. In order for the Azure AD provisioning service to function as expected, the IP addresses used must be allowed. For a list of IP addresses for each service tag/region, see the JSON file - [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519). You can download and program these IPs into your firewall as needed. The reserved IP ranges for for Azure AD provisioning can be found under "AzureActiveDirectoryDomainServices."
1349+
13471350

13481351
## Related articles
13491352
* [Automate User Provisioning/Deprovisioning to SaaS Apps](user-provisioning.md)

0 commit comments

Comments
 (0)