@@ -35,7 +35,7 @@ For additional details about supported attributes and SCIM, see
3535> your SCIM values.
3636>
3737> Alternatively, you can disable JIT provisioning to rely solely on SCIM.
38- > For details, see [ Just-in-Time] ( just-in-time.md ) .
38+ > For details, see [ Just-in-Time] ( /enterprise/security/provisioning/ just-in-time) .
3939
4040## Enable SCIM in Docker
4141
@@ -219,7 +219,7 @@ group will inherit these attributes upon provisioning.
219219
220220### Step one: Configure attribute mappings
221221
222- 1 . Complete the [ SCIM provisioning setup] ( #enable-scim-in-docker ) .
222+ 1 . Complete the [ SCIM provisioning setup] ( /enterprise/security/provisioning/scim/provision-scim/ #enable-scim-in-docker) .
2232231 . In the Azure Portal, open ** Microsoft Entra ID** >
224224 ** Enterprise Applications** , and select your SCIM application.
2252251 . Go to ** Provisioning** > ** Mappings** >
@@ -228,7 +228,7 @@ group will inherit these attributes upon provisioning.
228228 - ` userPrincipalName ` -> ` userName `
229229 - ` mail ` -> ` emails.value `
230230 - Optional. Map ` dockerRole ` , ` dockerOrg ` , or ` dockerTeam ` using one of the
231- [ mapping methods] ( #step-two-choose-a- role-mapping-method ) .
231+ [ mapping methods] ( /enterprise/security/provisioning/scim/provision-scim/#set-up- role-mapping) .
2322321 . Remove any unsupported attributes to prevent sync errors.
2332331 . Optional. Go to ** Mappings** > ** Provision Azure Active Directory Groups** :
234234 - If group provisioning causes errors, set ** Enabled** to ** No** .
0 commit comments