Provisioning Users from Azure Active Directory into CloudLink

CloudLink supports automatic provisioning of users from Azure Active Directory (Azure AD) into the CloudLink database. For this, the user data in this directory is synchronized with the CloudLink database using System for Cross-domain Identity Management (SCIM). This enables a Mitel Partner or an Account Admin to manage the users and application services in Azure AD and have them provisioned into the CloudLink database, which minimizes data entry and administration tasks.

Note: For MiVoice Office 400, Mitel recommends the Active Directory (AD) integration to be configured through Mitel Open Interface Platform (OIP) as this method is used as a directory integration rather than the user creation. This allows all PBX users access to all the imported contacts, provided PBX extended search is enabled in the Contacts (Web client) or Contacts (Mobile client). For more details about AD integration using Mitel OIP, see Mitel Open Interfaces Platform - System Manual

Prerequisites

To configure provisioning of users from Azure AD into CloudLink, the Mitel Partner or Account Admin:

In this document, it is assumed:

Adding Azure AD Sync integration to a customer account

Provisioning users from Azure AD into a customer account in Mitel Administration requires Azure AD Sync integration to be added to that customer account from the Mitel Administration. A Mitel Partner or an Account Admin can add Azure AD Sync integration to a customer account by using the following procedure:

  1. Navigate to the Account Information page of the customer account.
  2. In the Integrations section, click + Add new.


    A pop-up screen displays the Integrations panel.

    Note: A Mitel Partner cannot enable integrations in the Partner Account because integration with other applications is not supported for Partner Accounts. To integrate CloudLink with other applications, a Partner must create a customer account and enable integrations in that account. Mitel recommends that you disable any existing integrations in the Partner Account to avail the full functionality of CloudLink features. For more information about Partner Accounts, see Log in as a Mitel Partner.
  3. Click the 3rd party tab. A list of third-party applications supported by CloudLink is displayed. Click the Add button associated with Azure AD Sync, and click Done.


    The Azure AD Sync integration is added to the customer account and is displayed in the Integrations section of the Account Information page.



Provisioning Users from Azure AD into CloudLink using SCIM

Provisioning users from the Azure AD to the CloudLink database using SCIM involves the following tasks:

  1. Creating a SCIM application in Azure AD — create a SCIM application to enable user provisioning.
  2. Adding users to the SCIM application — add users to the SCIM application.
  3. Configuring the SCIM application — configure the SCIM settings on the application side.
  4. Testing the Connection — verify that the configuration works.
  5. Managing the attribute mappings — review and customize the attribute mappings that will be synchronized with the CloudLink database during provisioning.
  6. Start Provisioning — start provisioning users to the CloudLink database.

Creating a SCIM application in Azure AD

To create a SCIM application:

  1. In the Azure portal, on the left navigation panel, click Azure Active Directory. The Azure Active Directory panel opens.


  2. In the Azure Active Directory panel, select Enterprise applications. The All applications page opens, displaying a list of applications in your Azure AD tenant.


  3. Click New application. The Browse Microsoft Entra Gallery page opens.


  4. Click + create your own application.


  5. Type the name for your application (for example, Mitel CloudLink), and click Add.


    The application will be added to the Azure AD, and will be displayed in the All applications page.

Adding users to the SCIM application

This section describes how to add users in the Azure Active Directory to the SCIM application to be provisioned to CloudLink.

  1. Access the Users and groups page in the Azure portal, by doing the following:
    1. Navigate to Azure Active Directory > Enterprise applications, and select your application from the list. The application’s Overview page opens.
    2. Under the Manage section, select Users and groups.


  2. In the Users and groups page that opens, click + Add user. The Add Assignment page opens.


  3. Click the Users and groups option. The Users and groups panel opens. From the list in the Users and groups panel, click the users you want to add to the SCIM application, and click Select to select these users. The selected users are listed under Selected items.


  4. Click Assign to add these users to the SCIM application.


    These users will be displayed in the Users and groups page.



Configuring the SCIM application

This section describes how to configure the SCIM application in Azure AD with the parameters supplied by the Mitel Administration to establish connection between the SCIM application and the Mitel Administration.

To configure the SCIM application, it is recommended that you open the Azure portal and the Mitel Administration side-by-side as you will need to copy some values from the Mitel Administration to the Azure portal.

  1. To access the Provisioning page in the Azure portal, do the following:
    1. Navigate to Azure Active Directory > Enterprise applications, and select your application from the list. The application’s Overview page opens.
    2. Under the Manage section, select Users and groups.


  2. In the Provisioning page that opens, select Provisioning Mode as Automatic from the drop-down menu.


    The Admin Credentials section is displayed.



  3. Provide theTenant URL and the Secret Token. You can generate the URL and the token from the Mitel Administration by following these steps:
    1. From the Integrations section, click the Complete setup button associated with Azure AD Sync. The Azure AD Sync configuration dialog box opens.


    2. Click Generate keys. The Tenant URL and the Secret Token are generated. Click Copy and paste these values in the respective fields in the Azure AD portal.


      Note: Every time Generate keys is clicked, any URL and token from a previous synchronization become invalid and the SCIM application must be configured with new ones.

Testing the Connection

This section describes how to verify whether the configuration works, and to check whether the connection between the SCIM application and CloudLink is successful.

  1. In the Provisioning page, within the Admin Credentials section, click Test Connection. The SCIM application attempts to connect to CloudLink.

    If the connection is successful, the following message is displayed.



    If the connection fails, the following error message is displayed. Rectify the error and test the connection again.



  2. If the connection is successful, click Save to save the admin credentials for user provisioning. Clicking Discard will cancel the changes.


Managing the attribute mappings

This section describes how to customize the default attribute mappings in the SCIM application that define which user properties are provisioned from Azure AD to the CloudLink database. You can change or delete the current attribute-mappings, or create new attribute-mappings. To do this:

  1. In the Provisioning page, click Edit attribute mappings from the Manage provisioning section.


  2. In the page that opens, expand the Mappings tab, and do the following:
    • Disable Groups mapping: You must disable the provisioning of group objects between the Azure AD and the CloudLink database. This is required because CloudLink database does not support provisioning group objects. To do this:
      1. Click Provision Azure Active Directory Groups.


      2. In the Attribute Mapping page that opens, disable the Enabled option by clicking No. Click Save to save the changes.
        Note: By default, the Enabled option will be set to Yes.


    • Customize attributes : You must customize the attributes to be provisioned between Azure AD and the CloudLink database. To do this:
      1. Click Provision Azure Active Directory Users.

        The Attribute Mapping page opens, displaying the list of default attributes in Azure AD.



      2. You can choose to retain the default attribute mappings to be provisioned to the CloudLink database. You can also add new attribute mappings by clicking Add New Mapping. To delete a default attribute mapping, click the Delete option associated with the attribute.

        You must ensure that the following conditions are met when you review the attributes to be provisioned between Azure AD and the CloudLink database.

        • The following attributes listed under customappsso Attribute are mandatory and must not be deleted.
          • userName
          • one among displayName, name.givenName, or name.familyName
          • emails[type eq "work"].value
        • CloudLink requires valid users to have an email address. To facilitate this requirement during provisioning, you must make sure that the attribute type emails[type eq "work"].value under customappsso Attribute is mapped to the attribute type under Azure Active Directory Attribute that contains the user’s email address in Azure directory.
        • In addition to the mandatory attributes mentioned above, CloudLink supports the following attributes listed under customappsso Attribute. You must select only the following attributes.
          • active
          • externalId
          • emails[type eq "other"].value
          • phoneNumbers[type eq "mobile"].value
          • phoneNumbers[type eq "work"].value
          • phoneNumbers[type eq "other"].value
          • roles[primary eq "True"].value
          • all attributes related to addresses, MiCollab supports only the attributes related to the "work" type addresses.
          Note:
          • In Azure AD, if you clear or leave blank any of the user details fields that is mapped to an attribute, the field will not be provisioned because Azure AD provisioning service does not support provisioning null values. For more information about attribute mapping properties, see Azure documentation.
          • If you remove any attribute mapping in the Azure AD after you start provisioning, the modification will not be updated in the CloudLink database automatically.
          • The Phone numbers must be in E164 format.

      3. After you customize the necessary attribute mappings, click Save to save the changes. Clicking Discard will cancel the changes.

Start Provisioning

After you define the attributes, you must initiate the provisioning. To do this:

  1. Access the Provisioning page in the Azure portal, by doing the following:
    1. Navigate to Azure Active Directory > Enterprise applications, and select your application from the list. The application’s Overview page opens.
    2. Under the Manage section, select Provisioning.


  2. In the Provisioning page that opens, click Start provisioning.


    The Azure AD provisioning service runs an initial provisioning cycle. After the cycle is complete, the status of the cycle will be displayed in the Provisioning page as shown in the following screenshot.



    The Current cycle status shows the completion status. This section also displays the number of users provisioned.

    The initial provisioning cycle is followed by periodic incremental cycles. The incremental cycles happen every 40 minutes. For more information about provisioning cycles, see the Azure documentation.

    Note: If errors occur during a provisioning cycle, the synchronization is retried in the next cycle. If the errors continue to occur, then the retries will occur at a reduced frequency, that is, the frequency of scheduled provisioning will decrease. For more information, see the Azure documentation.

After the initial cycle is completed, you have the following options to manage the provisioning:

Deleting a User with Phone Conflict

This feature allows administrators to search for users with phone number conflicts and delete them, including both active and inactive users.

  1. Navigate to the Users page.
    Note: For accounts with AD Sync integration, a link—'Click here if you have an AD Sync phone number conflict'—appears at the top of the Users page.


  2. Select the Click here if you have an AD Sync phone number conflict link.

    The Phone Number Conflict Search dialog box appears.



  3. Enter the phone number in the search box.
  4. Click Search.

    The user appears at the bottom of the search box.



  5. Verify the user.
  6. Click Delete to remove the user.