- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
See the following instructions to synchronize your Datadog users with Microsoft Entra ID using SCIM.
For capabilities and limitations of this feature, see SCIM.
SCIM in Datadog is an advanced feature available with the Infrastructure Pro and Infrastructure Enterprise plans.
This documentation assumes your organization manages user identities using an identity provider.
Datadog strongly recommends that you use a service account application key when configuring SCIM to avoid any disruption in access. For further details, see using a service account with SCIM.
When using SAML and SCIM together, Datadog strongly recommends disabling SAML just-in-time (JIT) provisioning to avoid discrepancies in access. Manage user provisioning through SCIM only.
Note: If you already have Datadog configured with Microsoft Entra ID for SSO, go to Enterprise Applications and select your existing Datadog application.
https:///api/v2/scim
Note: Use the appropriate subdomain for your site. To find your URL, see Datadog sites.Expand the Mappings section
Click Provision Azure Active Directory Users. The Attribute Mapping page appears.
Set Enabled to Yes
Click the Save icon
Under Target Object actions, ensure Create, Update, and Delete actions are selected
Review the user attributes that are synchronized from Microsoft Entra ID to Datadog in the attribute mapping section. Set the following mappings:
Microsoft Entra ID Attribute | Datadog Attribute |
---|---|
userPrincipalName | userName |
Not([IsSoftDeleted]) | active |
jobTitle | title |
mail | emails[type eq "work"].value |
displayName | name.formatted |
After you set your mappings, click Save.
Group mapping is not supported.