Provisioning Zoom users with Microsoft Azure AD (now known as Microsoft Entra ID) allows you to automate user account creation, updates, and deactivation. This guide outlines the steps to configure Zoom with Microsoft Entra ID for user provisioning. The basic steps involve creating an Enterprise Application in Azure AD, configuring provisioning settings with a secret token from Zoom, and assigning users or groups to the application.
Prerequisites
- Zoom owner or admin privileges on a Business or Education account.
- A Microsoft Entra ID (Azure AD) tenant with appropriate permissions to create and manage Enterprise Applications.
- Users in Microsoft Entra ID who have Zoom licenses assigned or are intended to be assigned.
- A plan that meets the requirements for SCIM provisioning.
Configure Zoom for SCIM Provisioning
- Sign in to the Zoom web portal as an administrator with the necessary privileges.
- Navigate to Advanced then App Marketplace.
- Search for Azure AD or Microsoft Entra ID.
- Find the Zoom app listed in the Marketplace.
- Click on the app to access the details page.
- Click Install to begin the installation process.
- Authorize Zoom to access the necessary permissions within your Azure AD tenant by following the on-screen prompts.
- Copy the Secret Token: After authorization, Zoom will generate a secret token or SCIM base URL. Make sure to securely store this token, as it will be used in Azure AD for provisioning. This might be located in the “Provisioning” tab of the app in the Zoom Marketplace.
- Retrieve SCIM Base URL: Obtain the SCIM Base URL from Zoom, typically formatted like:
https://api.zoom.us/scim2. This URL, along with the secret token, will configure the connection in Azure AD.
Create the Enterprise Application in Azure AD
- Sign in to the Microsoft Entra admin center (previously Azure portal) as at least a Cloud Application Administrator.
- Browse to Identity > Applications > Enterprise applications.
- Click New application to create a new application.
- Click Create your own application.
- Enter a name for the application such as “Zoom User Provisioning”.
- Select “Integrate any other application you don’t find in the gallery (Non-gallery)”.
- Click Create.
Configure Provisioning in Azure AD
- Navigate to Identity > Applications > Enterprise applications.
- Select the “Zoom User Provisioning” application you created.
- Click on the Provisioning blade in the left-hand menu.
- Set the Provisioning Mode to “Automatic”.
- Configure Admin Credentials:
- In the Tenant URL field, enter the SCIM base URL you obtained from Zoom (e.g.,
https://api.zoom.us/scim2). - In the Secret Token field, enter the secret token you copied from Zoom.
- Click Test Connection to verify that Azure AD can successfully connect to Zoom using the provided credentials. Address any errors before proceeding.
- In the Tenant URL field, enter the SCIM base URL you obtained from Zoom (e.g.,
- Configure Mappings:
- Expand the Mappings section.
- Click on Provision Azure Active Directory Users.
- Review the default attribute mappings. Common mappings include:
userPrincipalNametouserNamedisplayNametodisplayNamemailtoemails[type eq "work"].valuegivenNametoname.givenNamesurnametoname.familyName
- Add any additional attribute mappings required by Zoom, referring to the Zoom Phone SCIM attributes article if you are provisioning phone users. This may include department, job title, or other custom attributes.
- Ensure the “Match objects using this attribute” is set to
userPrincipalNamefor unique user identification. - Click Save after reviewing the mappings.
- Configure Settings:
- Under the Settings section, ensure the Scope is set to “Sync only assigned users and groups” (recommended for a controlled rollout). Alternatively, you can choose “Sync all users and groups,” but be aware that this will provision all users in Azure AD to Zoom.
- Optionally, provide a notification email address to receive notifications about provisioning failures.
- Enable Provisioning:
- Set the Provisioning Status to On.
- Click Save.
Assign Users and Groups
- Navigate to Identity > Applications > Enterprise applications.
- Select the “Zoom User Provisioning” application you created.
- Click on the Users and groups blade in the left-hand menu.
- Click Add user/group.
- Select the users and/or groups you want to provision to Zoom.
- Click Assign.
Monitor Provisioning
- Navigate to Identity > Applications > Enterprise applications.
- Select the “Zoom User Provisioning” application you created.
- Click on the Provisioning blade in the left-hand menu.
- Review the Provisioning logs for details on user and group synchronization. Address any errors or failures as needed.
Common Issues
- Test Connection Failed: Verify the SCIM base URL and secret token are correct. Ensure there are no typos and that the token has not expired in Zoom. Double check that the Zoom App in Azure AD is properly authorized.
- Users Not Provisioned: Confirm that the users are assigned to the application in Azure AD. Verify the provisioning status is set to “On”. Review the provisioning logs for errors. Ensure the user has a Zoom license assigned (either directly or through group assignment in Zoom, if applicable).
- Attribute Mapping Errors: Double-check the attribute mappings for accuracy. Ensure the source and target attributes are compatible. If you are provisioning phone users, make sure to add all required attributes according to the Zoom Phone SCIM documentation.
- Rate Limiting: Zoom may enforce rate limits on SCIM provisioning. If you encounter rate limiting errors, reduce the frequency of synchronization or contact Zoom support to increase your rate limit.
- Incorrect License Assignment: If user provisioning is successful but licenses aren’t correctly assigned, double-check license settings within the Zoom admin portal and verify the logic for license assignments based on group membership in Azure AD is working as expected.