How do I manage user provisioning with Azure Entra ID (formerly Azure AD)?

Last updated: July 14, 2025

Context

When integrating Spacelift with Azure Entra ID (formerly Azure AD) using OIDC, organizations need efficient ways to manage user access and provisioning. While SCIM and Just-in-Time (JIT) provisioning are not currently available, there are alternative methods for managing user access at scale.

Answer

There are two main approaches to manage user provisioning when using Azure Entra ID with Spacelift:

1. IdP Group Mapping

IdP Group Mapping allows you to bulk add users and manage access by mapping Azure Entra ID groups to Spacelift spaces:

  • Invite entire teams at once

  • Assign teams to specific Spaces

  • Manage access through your IdP groups

For detailed setup instructions, refer to the IdP Group Mapping documentation.

2. Login Policies

Login Policies provide dynamic user access management based on identity attributes:

  • Create rules based on identity information available in the teams data input section

  • Automatically control access based on user attributes

  • Operates independently of IdP Group Mapping

For implementation details, see the Login Policies documentation.

Note: If you need to switch from Login Policies to manual user management, you can queue invitations for users in advance. See the guide on Migrating From Login Policies.