Automated User Provisioning (AUP) lets you instantly sync users and groups from your identity provider (IdP) to the Cloud Console, using the SCIM (System for Cross-domain Identity Management) standard. You no longer need to send invites or wait for users to sign in. This guide shows how to set up AUP with Microsoft Entra as the IdP. When you finish, SAML SSO and one-way SCIM are configured, and you can assign Entra users and groups so they sync into CoreWeave IAM.Documentation Index
Fetch the complete documentation index at: https://docs.coreweave.com/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
You need the following access:- Admin access to the CoreWeave Cloud Console.
- Admin access to the Microsoft Entra dashboard.
Create SAML integration
Configure SAML SSO first, because AUP relies on it for authentication.-
Open the Cloud Console and the Microsoft Entra dashboard in separate windows.
- In the Cloud Console: Navigate to the SAML SSO page and click Configure SAML.
- In Entra: Open the Microsoft Entra dashboard at entra.microsoft.com.
- Click Enterprise Apps, select + New Application in the top bar, and select Create your own application.
- Choose an appropriate name for your CoreWeave organization and select Integrate any other application you don’t find in the gallery (Non-gallery).
- When you return to the Enterprise Apps page, select your new application and click Single sign on under the Manage menu in the left bar.
- In Entra, select SAML 2.0 under Select a single sign-on method.
- Under field 1: Basic SAML Configuration, click Edit.
- Copy the ACS URL from the Cloud Console and paste it into Entra’s Reply URL (Assertion Consumer Service URL) field.
- Copy the Entity ID from the Cloud Console and paste it into Entra’s Entity ID field.
- Under field 2: Attributes and Claims, click Edit.
-
For each claim under Additional Claims, map the following fields to each Azure value by clicking each claim and editing the top Name field:
Name Value first_nameuser.givennamelast_nameuser.surnameemailuser.mail - Under section 3: SAML Certificates, click Edit. On the following menu under Signing Option, set this to Sign SAML Response and Assertion. Click Save to save settings.
- Return to section 3: SAML Certificates. Copy the URL from the App Federation Metadata URL field into your clipboard.
- Return to the CoreWeave Cloud Console. Click the Metadata URL field and paste the URL you copied from Entra.
- In the Cloud Console, click Next and then click Deploy SSO.
- Return to Entra, and scroll to the end of the SAML configuration page. Click Test, and then in the Test Single Sign on with your [Enterprise App Name] dialog click Test. You should be prompted to sign in through your Microsoft account into CoreWeave Console. If the test succeeds, you complete sign-in and arrive at the Clusters page.
Configure one-way SCIM
Set up one-way SCIM provisioning so the Cloud Console can receive user and group information from Entra:- In the Cloud Console, on the SCIM Configuration page, toggle Enable SCIM API and Enable Automated User Provisioning. Record the SCIM Base URL and SCIM Token values. You need both later.
- In the Cloud Console, create a new SCIM Token with a name of your choice (for example, Entra ID).
-
In Entra:
- On your Enterprise App’s left navigation bar, click Provisioning (located under Single Sign On).
- Click Connect your application under Create configuration.
- Copy the SCIM Base URL from the Cloud Console and paste this into the Tenant URL field in Entra.
- Copy the SCIM Token from the Cloud Console and paste it into the Secret token field in Entra.
- Click Test connection. If the test succeeds, you should see a green alert at the top right corner of your browser window.
- Click Create.
Assign users and groups
To complete the integration, assign users to a group in your IdP, and then assign the group to your application. Then test the integration by checking whether the users sync to the Cloud Console.- In the Cloud Console, navigate to the Users page to view a list of all users in your organization.
-
Assign users to a group in Entra:
- In Entra, click Users and groups on your Enterprise App’s left menu under Manage.
- Click Add user/group to select the users and groups that should sync with CoreWeave Cloud IAM.
- In Entra, toggle the Provisioning Status to On under the Provisioning section. (This step is required when enabling provisioning for the first time.)
- In the Cloud Console, refresh the page showing your Users list. The users in the group you just assigned in Entra appear immediately in the Cloud Console.
Map SSH keys for SUNK
If you use SUNK User Provisioning (SUP), you can sync SSH public keys from Entra to CoreWeave so that users can use SSH to connect to SUNK login nodes. This requires creating a custom extension attribute in Entra and mapping it to CoreWeave’s SCIM endpoint.If you are not using SUNK, skip this section.
Create the SSH key extension attribute
Entra does not include a built-in attribute for SSH keys. You must create a custom extension property on your Enterprise Application’s backing application registration.-
In PowerShell, install the Microsoft Graph module if you have not already:
-
Connect to Microsoft Graph. This operation requires the
Application.ReadWrite.Allpermission: - Find the Object ID of the application registration that backs your CoreWeave Enterprise Application. In the Entra portal, navigate to App registrations > All applications, find your CoreWeave app, and copy the Object ID (not the Application ID).
-
Create the extension property. Replace
[APP-OBJECT-ID]with that object ID:Entra generates a prefixed name likeextension_[APP-ID-NO-HYPHENS]_sunkSshKeys. This prefixed name is what you reference within Entra (for example, in PowerShell commands and Terraform). CoreWeave’s SCIM endpoint only sees thesunkSshKeysportion after the namespace mapping, so the prefix does not affect provisioning.
Set the SSH key on a user profile
Writing custom extension attributes to user profiles requires theUser.ReadWrite.All Microsoft Graph permission. The more limited User.ReadWrite scope is not sufficient for custom extension attributes.
To set an SSH key on a user profile, replace [USER-EMAIL] with the user’s email address, replace the extension attribute name with the prefixed name Entra generated, and replace [SSH-PUBLIC-KEY] with the full public key string:
[SSH-PUBLIC-KEY] might look like ssh-ed25519 AAAAC3Nza....
Add the attribute mapping
- In Entra, navigate to your CoreWeave Enterprise Application.
- Under Manage, select Provisioning > Attribute Mapping (Preview).
- Select Provision Microsoft Entra ID Users.
-
Click Add New Mapping and configure the following fields:
Field Value Mapping type Direct Source attribute extension_[APP-ID-NO-HYPHENS]_sunkSshKeysTarget attribute urn:coreweave:params:scim:schemas:extension:coreweave:2.0:CoreWeaveUser:sunkSshKeysMatch objects using this attribute No Apply this mapping Always - Click OK, then click Save at the top of the attribute mappings page.
Verify the sync
- In Entra, trigger a provisioning cycle (or wait for the next automatic cycle).
- In the Cloud Console, navigate to Users, click the three-dot menu next to the target user, and select View Details.
- Under Slurm Attributes, confirm the SSH Keys field contains the public key you set in Entra.
Adjust attribute mappings
Remove the Department attribute
The department attribute in Microsoft Entra can prevent groups from syncing properly with CoreWeave IAM. Before syncing groups, remove this attribute:- Click Enterprise apps, and select the app that represents your CoreWeave integration.
- Under the Manage heading on the left menu, select Provisioning > Attribute Mapping (Preview).
- Select Provision Microsoft Entra ID Users.
- Find the department attribute, and under Remote click Delete.
- Navigate to the top of the page and click Save to save your attribute mapping.
Sync groups
Nested groups
CoreWeave SCIM does not support nested groups. If you assign a parent Entra group whose Members list includes references to other groups, provisioning fails for those nested group members. To avoid sync errors, use one of the following approaches:- Assign only flat (leaf) groups to your Enterprise App. Do not assign parent groups that contain sub-groups.
- Add a scoping filter on the group provisioning mapping to exclude parent groups.
- Use an Entra dynamic group to flatten nested memberships into a single flat group before syncing.
Recommended group sync configuration
- Configure a regular Entra group for all the users you want to push to CoreWeave.
- Configure regular Entra groups for all the subgroups that you want to represent in the Cloud Console.
- For legacy CoreWeave IAM deployments, ensure that your selected Entra groups and subgroups are not named any of the default user groups, or for every push group with the same name as a default user group create a new user group with the appropriate default policies attached.
Legacy default user groups
Legacy CoreWeave IAM deployments automatically provisioned a set of default user groups with specific policies attached. The policies attached to these groups were necessary for operating CoreWeave services. These legacy default user groups included:adminmetricsreadwritebilling_viewer
- Create a new user group in CoreWeave IAM with a new preferred name.
- Assign the policies attached to a default user group. For example, for an administration group use the policies attached to the
admingroup. - Delete the default user group before configuring a push group with the same name.