Member-only story
SCIM use cases
part II
As we discuss the basics in the previous article this article will more focus on the use cases of SCIM. Where it should be used and not to use. If you are not familiar with what’s SCIM is you can read my previous article.
Below I will introduce several use cases where SCIM Is used as an open connector which acts as a mutual agreement between two functionally separated parties.
- Migration of Identities
Imagine there is a companyX where it has a social network application that uses the identity information of its users. This identity information is stored in a cloud service and thought of moving it to a different cloud service provider. With the use of SCIM companyX can easily migrate identity information to a new service.
2. Single Sign-On(SSO) Service
Joseph has an account in an application hosted by a cloud service provider cloud X. cloud X has federated its user identities with a cloud service provider cloud Y. Joseph requests a service from an application running on cloud Y. The application running on cloud Y, relying on Joseph’s authentication by cloud X and using identity information provided by cloud X, serves Joseph‘s request.
In short, it creates a platform with interoperable and scalable architecture and reduces the time and costs of all the involved parties.
3. Provisioning of the User Accounts for a Community of Interest (COI)
Suppose there is a Human resource service as HumanHRX which gives services to an organization call coca-cola. Coca-cola has offices around all over the globe. These information systems are composed of traditional as well as private and public cloud systems.
Local branches of this organization are responsible for collecting the personal information of their current employees. They can use HumanHRX for managing and adding new information about coca-cola employees. Using this service enables to use of the same schema and protocol since it’s using SCIM based mechanisms. Such a provider with SCIM capabilities is WSO2 identity server.
4. Transfer of Attributes to a Relying Party’s Website
Joseph has an account in a directory service DirectoryX. Joseph then visits a website relying…