Azure AD SCIM/SSO application configuration

This supplemental guide provides Azure AD specific details on how to configure the New Relic Azure AD SCIM/SSO application. This connects your organization's users to New Relic, and allows them to easily use single sign-on into New Relic. This supplemental guide is meant to be used along with the main automated provisioning guide.

Add SCIM/SSO application

Azure AD provides an application gallery, which includes various integrations for Azure AD, including the ones that New Relic offers. Add the New Relic SCIM/SSO application to your list of applications.

  1. Go to the Azure Active Directory admin center, and sign in if necessary. https://aad.portal.azure.com/
  2. Click on All services in the left hand menu.
  3. In the Main pane, click on Enterprise applications to navigate to the Enterprise applications page.
  4. Click on the button labeled +New Application.
  5. Find the New Relic SCIM/SSO application by entering New Relic in the name search box, and click on the application titled New Relic by Organization.
  6. Click on the button labeled Add.

Continue with the following section to connect the New Relic SCIM/SSO application to New Relic.

Configure connection

Configure the New Relic SCIM/SSO application to automatically provision your users to New Relic.

  1. From the New Relic SCIM/SSO application page, click on the Provisioning link in the sidebar.
  2. In the main pane, click on the button labeled Get started.
  3. In the Provisioning Mode pick-list, choose Automatic.
  4. In the Admin Credentials section, fill the Tenant URL and Secret Token fields with the values that have been provided to you by New Relic.
  5. To verify you can connect to New Relic, click the Test Connection button.
  6. When you see a message indicating verification success, click the Save button.

The New Relic SCIM/SSO application can now connect with New Relic. Continue with the following section to configure the provisioning rules.

Configure provisioning rules

Initially, nothing is configured to be sent to New Relic. You must configure Azure AD to send changes for user creation, updates, and deactivation.

Go to the Provisioning page and complete the following:

  1. Expand the Mappings section.
  2. Click Provision Azure Active Directory Users.
  3. Verify the Target Object Actions Create Update and Delete checkboxes are all checked.
  4. Verify the Attribute Mappings look correct for your environment. Each of the NewRelic attributes shown in the list must receive a value.

    You need to ensure that the Azure Active Directory attributes shown in the list on the left are good sources for the information to send to New Relic. In particular, not all environments set the mail attribute. If your environment does not set the mail attribute, userPrincipalName could be a good alternative.

  5. Leave the switch for Enabled set to Off until you are done with the user and group configuration in the next section. Once all configuration is ready, return to this page and set the switch to On.
  6. Click the Save button.

Here is an example of a filled in Attribute Mapping page with the default values. Your values may be configured differently depending on your situation.

Screen capture showing how to set attributes.

After saving the provisioning rules, the New Relic SCIM/SSO application is ready to provision any changes made to users assigned to the application. Continue with the following section to assign users and groups to the New Relic SCIM/SSO application.

Assign users and groups

After the New Relic SCIM/SSO application configuration and the New Relic side configuration is finished, you can assign users and groups to the application.

  1. From the New Relic SCIM/SSO application page, click on the Users and groups link in the sidebar.
  2. From the Users and groups page, click the +Add user button.
  3. From the Add Assignment page, click on Users and groups, and select the appropriate users or groups that you would like to provision. Then click Select and Assign.
  4. The selected users and groups appear on the Users and groups page, indicating that they are candidates for provisioning.
  5. Repeat the steps to add users and groups until all desired entities have been assigned to the application.

For more help

If you need more help, check out these support and learning resources: