
Resources
Maximo Application Suite – SCIM User Sync Configuration & Common Challenges Explained
Rahul Raju
January 27, 2026


Synchronizing users and groups between an Identity Provider (IdP) such as Azure Entra ID and the Maximo Application Suite (MAS) is a critical step in enabling centralized identity and access management. MAS supports SCIM 2.0 for provisioning, but several nuances — and a few pitfalls — can impact the sync process if not understood clearly.
This blog walks through:
SCIM provisioning from Azure Entra ID to MAS requires a JWT token, which is derived from a MAS API Key.
Note: MAS does not allow recovery of authentication token details.
If lost, you must generate a new API key.
Once the API key and token are created, you must issue a GET request to generate a JWT. You can use postman to generate the token with details below.
GET https://api.%3cmasdomain%3e/v1/authenticate]https://api.<masdomain>/v1/authenticate
The response returns a JWT token that will be used by Azure Entra SCIM provisioning.
A SCIM profile controls how identities and entitlements sync from the IdP. To create a profile, hit the following URL POST request with body as the below.
https://api.%3cmasdomain%3e/scim/v2/Profiles]https://api.<masdomain>/scim/v2/Profiles
Reference: User synchronization with SCIM 2.0 - IBM Documentation
{
"id": "MasProfile1",
"version": 1,
"identities": [
{
"id": "default-saml",
"type": "saml",
"samlId": "externalId"
}
],
"entitlement": {
"application": "BASE"
},
"runtimeConfigs": {
"useGroupDisplayNameAsGroupId": true
},
"workspaces": [
{
"id": "test",
"applications": ["manage"]
}
]
}
{
"id": "MasProfile2",
"version": 2,
"identities": [
{
"id": "default-saml",
"type": "saml",
"samlId": "externalId"
}
],
"entitlement": {
"application": "BASE"
},
"workspaces": [
{
"id": "uat",
"applications": ["manage"]
}
],
"runtimeConfigs": {
"useGroupDisplayNameAsGroupId": true
}
}
Maximo Security Groups and their membership can be managed in Azure Entra project, while application authorizations are managed in Maximo Manage. When groups sync via SCIM, the group ID (e.g., AP_MAXIMO_SUPERVISORS_tyhntb) gets mapped as the Group Name in Maximo, causing it to create a new group instead of linking to the existing AP_MAXIMO_SUPERVISORS group. Since AP_MAXIMO_SUPERVISORS_tyhntb is the SCIM group ID, we can’t remove or remap it.
When groups sync from Azure AD → MAS Core:
This causes a new group to be created in Maximo instead of mapping to the existing Maximo Security Group.
Add the following tag while creating the SCIM profile.
"useGroupDisplayNameAsGroupId": true
This ensures MAS uses the display name as the group ID and avoids unwanted suffixes.
Note: If modifying an existing profile in MAS, increase the "version" number. MAS only updates when the version changes.
When you remove a user from Azure Entra group, Entra sends the following patch request to MAS which forces MAS to delete all users from the group instead of one specific user.
The patch request logged in MAS Core logs:
PATCH: /scim/v2/MASStgProfileExt/Groups/Maximo-SECGROUP
{
'schemas': [...],
'Operations': [
{
'op': 'Remove',
'path': 'members',
'value': [{'value': 'userid'}]
}
]
}
This is NOT SCIM compliant.
{
"schemas": ["urn:ietf:params:scim:api:messages:2.0:PatchOp"],
"Operations": [
{
"op": "remove",
"path": "members[value eq \"userid\"]"
}
]
}
Azure Entra provides a SCIM compatibility mode.
Enable it by appending this parameter to the SCIM URL:
?aadOptscim062020
This resolves:
Reference:
Discover everything you need to know to modernize your asset management strategy.
Inside, you’ll learn:

ActiveG, BPD Zenith, EAM Swiss, InterPro Solutions, Lexco, Peacock Engineering, Projetech, Sharptree, and ZNAPZ have united under one brand: Naviam.
You’ll be redirected to the most relevant page at Naviam.io in a few seconds — or you can
go now.