Hi to all.
I was wondering if it is possible to auto-provision users from MS Entra to Eramba. This would be very helpful, if taking into account that for awareness programs, you would want to automatically add users to the trainings, after they are onboarded to the MS Portal.
i don’t know anything about this microsoft product, but if its is a directory of sorts that speaks LDAP then you should be able to do it with ldap sync: Access Management
IMPORTANT: as explained many times in trainings and documentation, the number of accounts most organisations need to create in eramba is number of departments times 2, the exception is if you are using the Awareness module. deviations from this, are likely to be questionable implementations from our perspective: Access Management
MS Entra is the new name of “Azure Active Directory”. I have setup SAML with this. However, If my organization has 200-300 people that need to have awareness training on GRC, then there is a larger overhead regarding updating the users via continuous uploads of our AD. This will also require an new process towards the GRC team any time a hire is done, and to add/update/upload the new user(s)
If auto provisioning is used, this can be done automatically.
Sure, but the problem I mentioned is not that they can’t AuthN via the other provided IdPs but rather that they can not be modified (add them to other groups).
Yes, the idea with LDAP sync is that you will handle everything on the AD side and then just sync everything into eramba. (for example, people in the IT department on the AD side will be synced to the IT department group in eramba).
Can you elaborate more on the specific use case so we understand better?
I have (let’s say) 250 users. I need to have records of GRC awareness programs for my ISO’s
I add these users in Entra to a group ie “Eramba Training”
The users are automatically added to Eramba to group(s) via autoprovisioning and assigned to trainings due to group settings
Case 2 (Update/managing)
New users are added to Entra.
The users are automatically added to Eramba to group(s) via autoprovisioning and assigned to trainings due to group settings
Case 3
New user joins Accounting group
User is automatically added to Eramba to group(s) via autoprovisioning and assigned to Reviews/tasks due to group settings
The method is called SCIM (System for Cross-Domain Identity Management) and is used by Microsoft Entra ID (Azure AD), Okta, Google Workspace and others.
is interesting, likely to happen some day, but please do not expect this to happen anytime before end of the year, we have full roadmap already for year 25 (and 26…!)
All of those uses cases work with AD at this time and in theory, you can set up a SCIM like functionality depending on your IDP.
For example, Okta has a LDAP interface that you can connect to Eramba. You would then configure it as a Group LDAP connector within Eramba, which you can then use to sync your users into the system. Then, you set up SAML as your authentication method and point that to your Okta SAML. I have group syncing running with Okta for one of my clients using this method (but for access reviews rather than pseudo-SCIM).
Of course, that’s not helpful since you’re on EntraID, but there’s still a couple of options -
Microsoft appears to support adding an LDAP interface to EntraID when you jump through enough hoops (basically, setting up a managed domain). I have not tried this myself, but the guide seems annoying and there’s things like cloud only users need to change their password after rolling this out in order to have the directory populated.
Some other service/software to bridge the gap. I believe something like Keycloak speaks all the relevant protocols and can likely connect to EntraID users hoovered up and then serve as the LDAP provider to Eramba.
Thanks for the ideas. Quite complicated though, and adds one more thing to manage and support.
We will do it manually for now, and see how it goes…
If we can add this to a wishlist or something similar, so as to get some upvotes, and if enough people want it, it may go into the (future) roadmap.