Automatic user provisioning is supported for the DatoCMS application.βββββο»Ώβο»Ώββββββο»Ώο»Ώβο»Ώβββββββββο»Ώββββββο»Ώββββββο»Ώβββββββββββββββο»Ώββββο»Ώο»Ώβββο»Ώββο»Ώββο»Ώβο»Ώββο»Ώββββο»Ώββο»Ώο»Ώββο»Ώβββββββο»Ώββββββββββο»Ώβββββββββββββββο»Ώβββββββββββο»Ώβββο»Ώβββο»Ώβββο»Ώβο»Ώβο»Ώββββο»Ώο»Ώββο»Ώο»Ώβββο»Ώββο»Ώββο»Ώβο»Ώββο»Ώββββββββββο»Ώββββο»Ώο»Ώβββο»Ώββο»Ώββο»Ώβο»Ώββο»Ώββββο»Ώββο»Ώο»Ώββο»Ώβββο»Ώο»Ώβββββββββββββο»Ώββββο»Ώο»Ώβο»Ώββββο»Ώο»Ώβββββο»Ώββββββββο»Ώβββο»Ώο»Ώβο»Ώβββο»Ώβββο»Ώβββββββο»Ώβο»Ώββο»Ώο»Ώβο»Ώβββο»Ώβββο»Ώβββο»Ώβββο»Ώβββο»Ώββββο»Ώο»Ώβββββο»Ώββββββββο»Ώββο»Ώβο»Ώββο»Ώο»Ώβο»Ώβο»Ώβο»Ώβββο»Ώβββο»Ώβο»Ώβο»Ώβββο»Ώβο»Ώβο»Ώβο»Ώβο»Ώβο»Ώβββββο»Ώο»Ώβ
This enables Microsoft Entra to:
Add new users to DatoCMS
Update usersβ profile information in DatoCMS
Deactivate users in DatoCMS
Push groups and memberships to DatoCMS
The following provisioning features are supported:
Create User - Creating a new user in Microsoft Entra and assigning them to the DatoCMS application will create a new user in DatoCMS.
Update User Attributes - Updates to a user in Entra will be pushed to DatoCMS.
Deactivate Users - Deactivating the user or disabling the user's access to DatoCMS within Microsoft Entra will deactivate the user in DatoCMS.
Reactivate Users - User accounts can be reactivated from Microsoft Entra.
Push Groups - Groups created in Microsoft Entra can be pushed to DatoCMS. Attributes pushed include name and group members.
Delete Groups - Groups deleted or removed from the DatoCMS application within Microsoft Entra will be deleted within DatoCMS.
Single Sign-On is only available for Enterprise plans.
Inside your Microsoft Azure dashboard search for Microsoft Entra ID and enter the service:
Enter the Enterprise Applications section, then click the New Application button:
Select Create your own application:
Name your application DatoCMS and click the Create button:
Enter the Single Sign-On section, then select SAML as single sign-on method:
Now click the small Edit button in the Basic SAML Configuration box, and fill in the following information:
Identifier (Entity ID): https://sso.datocms.com/<YOUR_SAML_TOKEN>/saml/metadata
Reply URL (Assertion Consumer Service URL): https://sso.datocms.com/<YOUR_SAML_TOKEN>/saml/consume
Sign on URL (optional): https://sso.datocms.com/<YOUR_PROJECT_ID>/saml/init
Make sure to replace <YOUR_SAML_TOKEN>
with the SAML Token present in the Settings > Single Sign-On > Settings section of your DatoCMS project:
Now move into the Provisioning section, and click the Get started button:
Within the Settings > Single Sign-On > Settings section of your DatoCMS project, click the SCIM Settings > API Token button:
Copy the resulting API token:
Fill in the following information:
Provisioning Mode: Automatic
Tenant URL: https://sso.datocms.com/scim
Secret Token: use the API token we generated in the previous step
Then click the Save button:
Go back to the Single Sign-On section, copy the App Federation Metadata Url...
...and paste it into the DatoCMS Identity Provider SAML Metadata URL field:
Make sure to also specify the default role editors will be assigned to (learn more about this field in the "Mapping Microsoft Entra Groups to DatoCMS roles" section below):
Press the Save settings button in DatoCMS.
In the Groups section in DatoCMS, you can now assign a specific role to each Group. For each group, assign the role with the same name:
Once you've configured a role for every group, the following rules will apply:
The group's role will be applied to to every user belonging to it;
In case a user belongs to multiple groups, the first group in the list will be the one to win. You reorder groups with drag&drop to customize their priorities;
In case a user does not belong to any group, the default role specified in the SSO Settings will be used:
DatoCMS recognizes the following claims for users (any other claim will be ignored):
DatoCMS recognizes the following attributes for users (any other attribute will be ignored):
For any issues, please contact our support to get customized help.