How to set up SCIM with Microsoft Entra ID

Calendly supports SCIM provisioning with Microsoft Entra ID (previously known as Azure Active Directory). You can create users, update user attributes (like name and email), deactivate users, and delete users. These changes will automatically sync to Calendly.

Note

SCIM is only available on the Enterprise plan. Due to changes to our Enterprise plan, some early Enterprise plans may include SAML but not SCIM. Please contact your Account Executive or our sales team to learn more.

Before you begin

  • You must set up SAML single sign on (SSO) before you can can set up SCIM

  • To configure SCIM, you must be a Calendly owner or admin

  • During setup, you’ll switch between Calendly and Microsoft Entra ID. It’s best to keep each platform open in a separate browser window

Set Up SCIM

Open the Calendly SCIM settings
  • Open Calendly
  • Select Admin center, then Login
  • At the top, select User provisioning
  • Turn on Enforce SCIM for my organization
  • Select the appropriate value for When do you want this token to expire?
  • Select Generate new bearer token
  • Select Copy token
    • It is recommended to keep a copy of this somewhere, as it can only be copied once
Open the Microsoft Entra ID provisioning settings
  1. In a separate window, sign in to the Microsoft Entra ID Portal and select Enterprise Applications

  2. From All Applications, select the custom application you set up for SAML SSO

  3. In the left sidebar, select Provisioning

  4. In the new left sidebar, select Manage dropdown and Provisioning again.

  5. Provisioning Mode should be set to Automatic

  6. Under Admin Credentials, paste the token from Calendly you copied earlier in the Secret Token field in Microsoft Entra ID
  7. Copy the Base URL from Calendly and paste it into the Tenant URL field in Microsoft Entra ID

  8. Select Test Connection
    • If the connection fails, try to paste the Base URL and token again
  9. Select Save located at the top of the Provisioning section
Set up Mappings in Microsoft Entra ID
  1. Under Mappings, select Provision Microsoft Entra ID Groups and toggle Enabled to No

    • Calendly does not support the SCIM Group provisioning endpoint

  2. Select Save, then select X in the top right to exit this view and return to Mappings

  3. Select Provision Microsoft Entra ID Users

  4. Under Target Object Actions, leave Create and Update checked

    • Choose to keep Delete checked or unchecked with caution

      • ⚠️ If a user is deleted in Microsoft Entra ID, Calendly will delete their Calendly account and all their data (This is a non-reversible action)

      • If left unchecked, the user will be deactivated and will no longer take up a paid seat or be able to be accessed (This is a reversible action)
  5. Under Attribute Mappings, keep the userName, active, and displayName attributes, but delete all other attributes

  6. Select Edit next to the userName attribute

  7. Under Source attribute, select mail, then select Ok

  8. Attribute mappings table should look like this:
    azure-scim3.png

  9. Select Save, then Yes

  10. Select X in the top right to exit this view and return to the Provisioning page

Enable provisioning in Microsoft Entra ID
  1. Open the Settings section

  2. If you want to be notified if provisioning fails, check Send an email notification when a failure occurs and enter the email of a person or group who should receive provisioning error notifications

  3. Under Scope, ensure Sync only assigned users and groups is selected

  4. To enable provisioning, toggle Provisioning Status to On and select Save

Note: The provisioning sync is every 40 minutes or you can manually provision using Provision on demand

Assign users the Calendly app
  1. In Microsoft Entra ID, return to the Calendly application page

  2. Select Users and groups from the lefthand sidebar

  3. Select + Add user/group

  4. Select None Selected

  5. Search for the users you want to add

  6. Select Select, then Assign

Assigning users to Calendly groups

For larger organizations, managing group membership in Calendly may require some level of automation. This can be achieved through SCIM by utilizing existing attributes of a user’s profile and mapping that value to a Calendly group. Read more about how to use groups here.

NOTE: Once you configure Map to groups, you will no longer be able to manage groups manually. This assumes user group membership is sourced from your identity provider.

Modify attribute mappings for Provisioning and create a new attribute for users
  1. Select Show advanced options
  2. Select Edit attribute list
  3. On a new row, add the following:
    1. urn:ietf:params:scim:schemas:extension:Calendly:2.0:User:group
    2. String
    3. Leave the rest unchanged
  4. Save and return to the attribute mappings table
    azure-scim1.png
Add the newly created group attribute
  1. Select Add new mapping on the Attribute Mappings table
  2. Select a source attribute that will represent the user’s group in Calendly
    • Example shown is "department"
  3. Select urn:ietf:params:scim:schemas:extension:Calendly:2.0:User:group as the target attribute
    • If it is not in the list, refresh the page
  4. Select ok to save
    azure-scim2.png
  5. Provision a user to Calendly using your typical provisioning process
Map to groups setup in Calendly
  1. Open Calendly
  2. Select Admin center, then Login
  3. At the top, select user provisioning then click map to groups
  4. Turn on Mapping attributes
  5. In the left column, type in or select the exact value(s) from your identity provider’s profile
  6. In the right column, either select an existing Calendly group or start typing to create a new groupcalgroup.png
  7. You can then Preview and Save your new provisioning