Available to organizations on an Enterprise+ plan.
This feature is an early access release and is currently only available to select customers.
Once your Asana domain is connected, go to the Provisioning tab.
Expand Mappings, and under that, click Provision Microsoft Entra ID Users
Scroll to the bottom of the Attribute Mapping page, and check Show advanced options. This will display a few more options. Click Edit attribute list for Asana.
If this is not available to you, make sure that you have followed the step in Before you begin to open Microsoft Entra ID with the schema fully enabled.
On the Edit Attribute List page, add a new user attribute called rbacRoles as a String type. Save the attribute list.
Back on the Attribute Mapping page, click, Add New Mapping.
Set the Mapping type to Expression
Set the Expression to
In this expression, you are setting up the role name and grabbing the corresponding custom role ID from Asana to replace the set of numbers. The role IDs must be parametrized - the IDs (the numbers) are placeholder for demonstration and must be replaced by your own Asana custom IDs.
Important - the order of the role in the expression will determine the priority of role assignment. Roles at the top will have higher priority. Later, if a user is in multiple role groups, they will get the highest priority role as defined here.
Skip the Default value field
Set Target attribute to rbacRoles, which is what we just created
Set Match objects using this attribute to No
Set Apply this mapping to Always
Navigate to the Manage roles page, click on the drop down to the right of each role, and click copy custom ID. Repeat this process for each standard role (Asana member, admin, and super admin) and any custom role you’ve created.
The result should look like this:
Click OK, and Save.
Go to Users and groups under Manage in the left navigation pane. Click on application registration on this screen.
We’ll create app roles that match the roles you have set up. Click Create app role.
Note
Values set in each app role created here must match the naming in the Expression set above. The value cannot have a space. Use an underscore in the place of a space.
Member
Admin
Custom roles: create more custom app roles to match all the custom roles you have set up
Click Apply to save the app roles.
Add all other roles from your domain.
The result will look like this:
Now, create an Entra group for each Asana role
Now we’ll assign the role to the group. Go to Enterprise application > Asana application > Manage > User and groups:
Click on Add user/group and associate each group to their corresponding role:
The result will look like this:
Now the setup is complete and you can add the users to their corresponding groups to assign roles. When the next provisioning cycle runs, this configuration will assign the corresponding role to the users (alternatively, you can provision on demand) and you will see this reflected in Asana.
Note
If you are provisioning users for the first time, and are looking to assign both license and role through Entra ID groups, please do this sequentially - provision users into one of license or role groups first, and then once the user is successfully provisioned, then you can assign the other license or role group to the user. If not, Entra will only assign one attribute and does not read the other as an ‘update’ to the user.