Troubleshooting
Common issues you may encounter when provisioning users from Azure Entra ID to nullplatform, with causes and solutions.
Provisioning fails with "Invalid credentials"
Cause: The API secret token is incorrect or expired.
Solution:
- Verify the token in your configuration is correct.
- Generate a new token if needed.
- Update the Secret Token in Azure Entra ID provisioning settings.
- Retry the provisioning operation.
Users are not syncing
Cause: Users may not be assigned to the application in Azure Entra ID.
Solution:
- In the application, go to Users and groups.
- Click Add user/group.
- Assign users or groups to the application.
- Wait for the next provisioning cycle (typically every 40 minutes) or manually trigger a sync.
"User not found" errors
Cause: The SCIM API cannot locate a user to update.
Solution:
- Check the userName mapping is correct (usually matches email or UPN).
- Verify user was successfully created on initial provisioning.
- Check provisioning logs for validation errors.
Attribute mappings not working
Cause: Attribute values may be missing or incorrectly mapped.
Solution:
- Verify the Azure Entra ID user has values for mapped attributes.
- Check the SCIM schema supports the attribute.
- Review the provisioning logs for specific mapping errors.
- Test with a sample user first.
Next steps
- SCIM provisioning overview: supported attributes, group mapping, and limitations
- Azure Entra ID provisioning documentation
- Manage users in nullplatform