You can configure user management through Azure Active Directory, provision groups, and assign Tableau Online site roles.

While you complete the following steps, it will help to have the Microsoft documentation at hand. See the tutorial, Configure Tableau Online for automatic user provisioning(Link opens in a new window).

Note: If you have already enabled provisioning for your application and would like to update to use the Tableau SCIM 2.0 endpoint, see the Microsoft article Update a Tableau Online application(Link opens in a new window). If you are setting up provisioning for a new instance of the Tableau Online application, follow the steps below.

Enable SCIM support

Use the following steps to enable SCIM support with Azure Active Directory.

  1. The SCIM functionality requires that you configure your site to support SAML single sign-on. If you have not done this, complete the section Add Tableau Online to your Azure AD applications in Configure SAML with Azure Active Directory.

  2. After adding Tableau Online from the Azure Marketplace, remain signed in to both the Azure portal and Tableau Online, with the following pages displayed:

    • In Tableau Online, the Settings > Authentication page.
    • In the Azure portal, the Tableau Online application > Provisioning page.
  3. On the Authentication page in Tableau Online, under Automatic Provisioning and Group Synchronization (SCIM), select the Enable SCIM check box.

    This populates the Base URL and Secret boxes with values you will use in the IdP’s SCIM configuration.

    Important: The secret token is displayed only immediately after it is generated. If you lose it before you can apply it to your IdP, you can select Generate New Secret. In addition, the secret token is tied to the Tableau Online user account of the site administrator who enables SCIM support. If that user’s site role changes or the user is removed from the site, the secret token becomes invalid, and another site administrator must generate a new secret token and apply it to your IdP.

  4. Copy the secret token value, and on the Provisioning page in your Azure portal, do the following:

    • For Provisioning Mode, select Automatic.

    • For Authentication Method, select Bearer Authentication.

    • For Secret Token, paste the Tableau Online SCIM secret token you copied earlier.

    • For Tenant URL, copy and paste the Base URL shown in the Tableau Online SCIM settings.

  5. Click Test Connection to verify the credentials are working as expected, and then click Save.

  6. In the Mappings section, verify that Provision Azure Active Directory Groups and Provision Azure Active Directory Users are enabled.

  7. Select Provision Azure Active Directory Groups, and on the Attribute Mappings page, review the attributes synchronized from Azure to Tableau Online. To save any changes, click Save.

  8. Select Provision Azure Active Directory Users, and on the Attribute Mapping page, review the attributes synchronized from Azure to Tableau Online. To save any changes, click Save.

Assign users and groups to the Tableau Online application

Use the following steps to assign individual users and groups to the Tableau Online application in Azure.

  1. From the application page, select Enterprise Apps > Users and groups.

  2. Click Add user/group.

  3. On the Add Assignment page, select a user or group and assign one of the following site roles: Creator, SiteAdministratorCreator, Explorer, SiteAdministratorExplorer, ExplorerCanPublish, Viewer, or Unlicensed.

    You will receive an error if you select a role that is not in the above list. For more information about site roles, see Set Users’ Site Roles.

  4. Click Assign.

Create groups for site roles

A user can be a member of multiple groups in Azure, but they will only receive the most permissive site role in Tableau Online. For example, if a user is a member of two groups with site roles Viewer and Creator, Tableau will assign the Creator site role.

To keep track of role assignments, we recommend creating role-specific groups in Azure, such as “Tableau - Creator”, “Tableau - Explorer”, etc. You can then use the groups to quickly provision new users for the correct role in Tableau Online.

Site roles are listed below in order from most permissive to least permissive:

  • Site Administrator Creator

  • Site Administrator Explorer

  • Creator

  • Explorer (Can Publish)

  • Explorer

  • Viewer

Note: Users and their attributes should be managed through Azure. Changes made within Tableau Online directly may result in unexpected behavior and overwritten values.

Provision users and groups

After you have enabled SCIM support and assigned users and groups to the Tableau Online application in Azure, the next step is to provision users to your Tableau site.

  1. On the Provisioning page, expand the Settings section, and define the users or groups you want to provision to Tableau Online in Scope.

  2. Toggle Provisioning Status to On.

  3. Click Save.

Saving starts the initial synchronization of the users or groups defined in Scope. Synchronization occurs approximately every 40 minutes as long as the Azure AD provisioning service runs. To manually provision users outside of the schedule, select Provision on demand. For more information about on demand provisioning, see the Microsoft article On-demand provisioning in Azure Active Directory(Link opens in a new window).

After provisioning is complete, you should see the users or groups from Azure AD on the Site Users page in Tableau Online.

Change user authentication in Tableau Online

Provisioned users are assigned the SAML authentication type by default. To change the authentication type for users, use the steps below.

  1. In Tableau Online, select Users.

  2. On the Site Users page, select the checkboxes next to the users you want to assign an authentication type.

  3. On the Actions menu, select Authentication.

  4. In the Authentication dialog, select the preferred authentication type for the user.

For more information about the different authentication types in Tableau Online, see Authentication.

Thanks for your feedback!