All articles

SAML SSO Azure AD: User Provisioning

Table 55. Availability - Legacy plans


With SCIM protocol, admins can set up automatic user provisioning and deprovisioning for Wrike with Azure Active Directory (Azure AD).

Set up Wrike with the System for Cross Identity Management (SCIM) standard to automatically provision or deprovision users based on their status in Azure AD.

  • Automatic provisioning: Azure AD users are automatically provisioned for Wrike.

  • Synced user attributes: User attributes are automatically updated in Wrike when they're updated in Azure AD.


    To successfully update user attributes of account admins, the account admin who issued the API token must have the right to grant/revoke admin rights enabled.

  • Automatic deactivation: Wrike users are automatically deactivated in Wrike when they're deactivated in Azure AD.

This page is about integrating Wrike with Azure AD SCIM. We have a separate page on setting up SAML SSO to Wrike through Azure AD.


Members added through SCIM are billable as soon as they're provisioned.

Set up Wrike with Azure AD SCIM

You must have permission to Configure advanced security settings in Wrike and be an Azure AD admin to set up Wrike with Azure AD SCIM. We recommend setting up SAML SSO with Azure AD first.

Step 1: Add approved domains

Only users from approved domains will be automatically provisioned to Wrike.

Step 2: Find and note the SCIM URL

  1. Open your Wrike workspace.

  2. Click your profile picture in the view’s upper right-hand corner.

  3. Select Apps & Integrations.

  4. Click Azure AD in the list of apps and open the SCIM tab.

  5. Scroll to the bottom of the pop-up and copy the SCIM URL. You’ll be using it in a few steps.

  6. Close the Azure AD pop-up (but stay in Wrike) and move to Step 3.

Step 3: Obtain the OAUTH token

  1. Click API from the left-hand side of the Apps & Integrations page.

  2. Enter a name in the App name field (we suggest Azure AD SCIM).

  3. Click Create new.

  4. (Optional) Add an app description.

  5. Scroll to the bottom of the page and click Create Token.

  6. Enter your password and click Obtain token.

  7. Copy the token and save it somewhere. You’ll need to enter this information in Azure AD.


    You’re only shown your token once, so make sure you save it before moving on to the next steps.

  8. Click Save.

Step 4: Finalize the setup from Azure AD

  1. Sign in to your Azure AD domain at <yourorganization>.Azure

  2. Click Enterprise applications on the left.

  3. Find and select Wrike.

  4. Select Provisioning from the menu panel on the left.

  5. Under the Provisioning Mode menu, select Automatic.

  6. Scroll down to the Admin Credentials section.

  7. In the field next to Tenant URL, paste the base URL that you copied in Step 2.

  8. In the field next to Secret Token, paste the token you copied in Step 3.

  9. Click the Test connection button to confirm that all your settings are correct.

  10. If the test is successful, click the Save button at the top of the window. If not, double-check your settings or contact Wrike Support for help.

  11. Go to the Edit provisioning tab and click the Edit provisioning button.

  12. Scroll down to the Settings section.

  13. In the Scope drop-down menu, select which events you want to synchronize between Wrike and Azure: Sync only assigned users and groups or Sync all users and groups.


    Make sure that all relevant users and groups are assigned to Wrike’s app.

    Selecting Sync all users and groups is not recommended in most cases as it will sync all users in the directory to Wrike, regardless of whether they have been assigned to the enterprise app or to a group that is assigned to it.

  14. Set the provisioning status to On.

  15. Click Save at the top of the window to start the provisioning service.

Synced attributes

The following attributes are synced from Azure AD to Wrike:

  • Username

  • Given name

  • Family name

  • Primary email

  • Job title

  • Primary phone number

  • Organization name

  • Department

  • Wrike user type


    Specifying the Wrike user type (Regular, External, and Collaborator) is a custom attribute. By default, Regular users are created.


Missing attributes

If certain user attributes (e.g., phone number, department, or secondary emails) are filled in Wrike but missing in Azure AD, the information remains in Wrike even after user provisioning.

User provisioning/deprovisioning

If a user doesn't get provisioned or deprovisioned:

  • Check the System Log in the Azure AD administration portal to see if a SCIM provisioning attempt is listed there.

    • If there is no provisioning attempt listed, make sure that users are properly assigned to Wrike’s application in Azure AD.

    • If an error is listed, please contact our Support Team and provide error details.