Difference between revisions of "Cross-domain Identity Management (SCIM)"
Jump to navigation
Jump to search
Line 10: | Line 10: | ||
== See also == | == See also == | ||
+ | * {{SCIM}} | ||
* {{SAML}} | * {{SAML}} | ||
* {{AAA}} | * {{AAA}} |
Revision as of 09:31, 14 October 2022
wikipedia:System for Cross-domain Identity Management (2011, 2015) standard protocol.
- JFrog introduces initial support for the System for Cross-domain Identity Management (SCIM) protocol 2.0, to enable Enterprise and Enterprise+ customers to create, remove and disable user accounts from their choice of user management tool and automatically update the platform with these changes. Okta and Azure Active Directory (AD) have used to verify this capability
- GitLab: User SCIM identity visible in UI
See also
- SCIM, 1Password SCIM Bridge, AWS SCIM Automatic provisioning
- SAML, IdP, Assertion, Attribute, SCIM, Amazon Cognito, OpenID Connect (OIDC), SAML response,
SAML:EduPersonOrgDN
, Assertion Consumer Service (ACS), SAML examples,Entity ID
,Name ID
,SAMLResponse, saml-provider, saml2aws
,aws_iam_saml_provider
- AAA: Authc, Authz, Password policy, OAuth, OpenID, OIDC, LDAP, RADIUS, TACACS+, XTACACS, SAML, Secure LDAP, IEEE 802.1X, CHAP, RBAC, MFA, SCIM, Amazon Cognito
Advertising: