Difference between revisions of "Cross-domain Identity Management (SCIM)"
Jump to navigation
Jump to search
Tags: Mobile web edit, Mobile edit |
|||
(17 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
[[wikipedia:System for Cross-domain Identity Management]] (2011, 2015) standard protocol. | [[wikipedia:System for Cross-domain Identity Management]] (2011, 2015) standard protocol. | ||
+ | * [[JFrog]] introduces initial support for the System for Cross-domain Identity Management (SCIM) protocol 2.0, to enable Enterprise and Enterprise+ customers to create, remove and disable user accounts from their choice of user management tool and automatically update the platform with these changes. Okta and [[Azure Active Directory]] (AD) have used to verify this capability | ||
+ | * [[GitLab]]: User <code>SCIM</code> identity visible in UI | ||
+ | * [[Bitwarden]] servers provide a SCIM endpoint. | ||
− | * [[ | + | == Related == |
+ | * [[AWS IAM Identity Center]] ([[Created by SCIM]]) | ||
+ | * [[1Password SCIM Bridge]] | ||
+ | * [[SonarQube]] | ||
+ | * [[SAML]] | ||
+ | * [[AWS SCIM Automatic provisioning]] | ||
+ | * [[Configure SAML and SCIM with Google Workspace and IAM Identity Center]] | ||
− | * | + | == See also == |
+ | * {{SCIM}} | ||
+ | * {{SAML}} | ||
+ | * {{AAA}} | ||
− | |||
− | |||
− | |||
− | |||
[[Category:Identity management]] | [[Category:Identity management]] |
Latest revision as of 14:30, 4 July 2024
wikipedia:System for Cross-domain Identity Management (2011, 2015) standard protocol.
- JFrog introduces initial support for the System for Cross-domain Identity Management (SCIM) protocol 2.0, to enable Enterprise and Enterprise+ customers to create, remove and disable user accounts from their choice of user management tool and automatically update the platform with these changes. Okta and Azure Active Directory (AD) have used to verify this capability
- GitLab: User
SCIM
identity visible in UI
- Bitwarden servers provide a SCIM endpoint.
Related[edit]
- AWS IAM Identity Center (Created by SCIM)
- 1Password SCIM Bridge
- SonarQube
- SAML
- AWS SCIM Automatic provisioning
- Configure SAML and SCIM with Google Workspace and IAM Identity Center
See also[edit]
- SCIM, 1Password SCIM Bridge, AWS SCIM Automatic provisioning
- SAML, IdP, Assertion, Attribute, SCIM, Amazon Cognito, OpenID Connect (OIDC), SAML response,
SAML:EduPersonOrgDN
, Assertion Consumer Service (ACS), SAML examples,Entity ID
,Name ID
,SAMLResponse, saml-provider, saml2aws
,aws_iam_saml_provider
- AAA: Authc, Authz, Password policy, OAuth, OpenID, OIDC, LDAP, RADIUS, TACACS+, XTACACS, SAML, Secure LDAP, IEEE 802.1X, CHAP, RBAC, MFA, SCIM, Amazon Cognito
Advertising: