System for Cross-___domain Identity Management: Difference between revisions

Content deleted Content added
fixing intro bolding
expanding ampersand
Line 4:
One example might be that as a company onboards new employees and separates from existing employees, they are added and removed from the company's electronic employee [[Directory service|directory]]. SCIM could be used to automatically add/delete (or, [[Provisioning#User provisioning|provision]]/de-provision) accounts for those users in external systems such as [[G Suite]], [[Office 365]], or [[Salesforce.com]]. Then, a new user account would exist in the external systems for each new employee, and the user accounts for former employees might no longer exist in those systems.
 
In addition to simple user-record management (creating &and deleting), SCIM can also be used to share information about user attributes, attribute schema, and group membership. Attributes could range from user contact information to group membership. Group membership or other attribute values are generally used to manage user permissions. Attribute values and group assignments can change, adding to the challenge of maintaining the relevant data across multiple identity domains.<ref name="SCIM-19">{{cite book |author = Internet Engineering Task Force, Network Working Group|title = System for Cross-Domain Identity Management: Core Schema|version = Draft 19|date = May 11, 2015|url = http://tools.ietf.org/html/draft-ietf-scim-core-schema-19|accessdate = 2015-05-17}}</ref>
 
The SCIM standard has grown in popularity and importance, as organizations use more [[Software as a service|SaaS]] tools.<ref name="SCIMming" /><ref name="SailPoint">{{cite press release | title = Identity Management Companies To Demonstrate Simple Cloud Identity Management (SCIM) Specification at Internet Identity Workshop (IIW) | publisher = SailPoint | date = October 18, 2011 | url = https://www.sailpoint.com/news/identity-management-companies-to-demonstrate-simple-cloud-identity-manageme | accessdate = May 11, 2015 | archive-url=https://web.archive.org/web/20160304091205/www.sailpoint.com/news/identity-management-companies-to-demonstrate-simple-cloud-identity-manageme | archive-date=2016-03-04 | url-status=dead}}</ref> A large organization can have hundreds or thousands of hosted applications (internal and external) and related servers, databases and file shares that require user provisioning. Without a standard connection method, companies must write custom software connectors to join these systems and their IdM system.<ref>{{cite journal | last = Grizzle | first = Kelly | title = SCIM: Provisioning users, killing connectors | journal = SecureID News | publisher = SecureID | date = March 10, 2014 | url = http://www.secureidnews.com/news-item/scim-provisioning-users-killing-connectors/ | accessdate = May 17, 2015}}</ref>