Step 1: Add provisioning to your 1Password account
Before you can deploy 1Password SCIM Bridge, you’ll need to add the provisioning integration and get credentials for it. Click Get Started, sign in to your 1Password account, and follow the onscreen instructions.
If you see the details for an existing provisioning integration, you’ll need to deactivate it first. Click More Actions and choose Deactivate Provisioning.
After you complete the setup process, you’ll get a scimsession
file and bearer token. Save them both in 1Password and save the scimsession
file to your computer. You’ll need these to deploy the SCIM bridge and connect your identity provider.
Important
The bearer token and scimsession
file you receive during setup can be used together to access information from your 1Password account. You’ll need to share the bearer token with your identity provider, but it’s important to never share it with anyone else. And never share your scimsession
file with anyone at all.
Step 2: Deploy your SCIM bridge
2.1: Load the Container App template
- Download the Azure Resource Manager template file.
- Sign in to your account on the Microsoft Azure portal and navigate to the Deploy a custom template page.
- Choose Build your own template in the editor.
- Click Load file and choose the template file you downloaded earlier.
- Click Save.
2.2: Configure and deploy the Container App
- Fill out the following fields:
- Subscription: Choose the subscription you prefer.
- Resource group: Choose an existing Resource Group or create a new one.
- Region: Choose the region you prefer.
- Container App Name: Enter a name you’d like to use. By default, the name is
op-scim-con-app
. - Container App Env Name: Enter a name you’d like to use. By default, the name is
op-scim-con-app-env
. - Container App Log Analytics Name: Enter a name you’d like to use. By default, the name is
op-scim-con-app-log-analytics
. - Scimsession: Paste the contents of your
scimession
file. - Workspace Actor: If you use Google Workspace as your identity provider, enter the email address of a Google Workspace administrator for the service account. If you don’t use Google Workspace, leave this field blank.
- Workspace Credentials: If you use Google Workspace as your identity provider, paste the contents of the
.json
key file you downloaded as part of the Google Workspace setup. If you don’t use Google Workspace, leave this field blank.
- Click Review + create.
- After the validation succeeds, click Create. The deployment will take a few minutes.
Step 3: Test your SCIM bridge
After your SCIM bridge is deployed, run this test to make sure it’s online:
- Click Go to resource group and choose the container app you created.
- Choose Overview in the sidebar, then click the Application Url link. This is your SCIM bridge URL.
- Sign in with your bearer token and verify that your SCIM bridge is connected to your 1Password account.
Step 4: Connect your identity provider to the SCIM bridge
Important
If you’ve already been using 1Password Business, make sure the email addresses and group names in your 1Password account are identical to those in your identity provider.
- If anyone is using a different email address in 1Password, ask them to change it.
- If you have existing groups in 1Password that you want to sync with groups in your identity provider, adjust the group names in 1Password.
Because 1Password SCIM Bridge provides a SCIM 2.0-compatible web service that accepts OAuth bearer tokens for authorization, you can use it with a variety of identity providers.
Connect Microsoft Entra ID to 1Password SCIM Bridge
Step 1: Add 1Password Business as a custom application
To add 1Password Business as a custom application in Entra ID:
- Click Microsoft Entra ID, then select Enterprise applications in the sidebar.
- Click New application, then click Create your own application.
- Enter “1Password Business” for the name of the app and select Integrate any other application you don’t find in the gallery (Non-gallery). Then click Create.
You’ll see the details of the application you just created. Continue to the next section to configure it.
Step 2: Configure the application
On the 1Password Business application details page:
- Click Users and groups in the sidebar, then add the users and groups you want to provision to 1Password.
- Click Provisioning in the sidebar, then click Get Started.
- Set Provisioning Mode to Automatic.
- Enter your Tenant URL and Secret Token.Tenant URL: the URL of your SCIM bridge (not your 1Password account sign-in address). For example:
https://scim.example.com
If you don’t know your URL, make sure you’ve set up and deployed the SCIM bridge.Secret Token: the bearer token for your SCIM bridgeLearn what to do if you don’t have your bearer token. - Click Test Connection, then click Save and click X (Close) in the top right.
- Click Edit Provisioning.
- If you want to use custom attribute mappings, click Mappings and refer to the default mappings below.
- Set Provisioning Status to On and click Save.