Download presentation
Presentation is loading. Please wait.
1
SCIM Use Case Scenario
2
Presumptions SCIM Triggers SCIM Security Model PII
3
SCIM Client Provisioning
Scenarios Cloud-to-Enterprise PUSH and Cloud-to-Cloud PUSH The Event Receiver already has SCIM access to the Event Transmitter service provider (includes HTTP credentials and endpoint). Event Receivers and Transmitters can agree out-of-band on SET/JWT security requirements including use of signing and/or encryption to be documented in a Stream Configuration. SCIM Service Provider SCIM Event Stream SCIM Commands SCIM Events SCIM Client Provisioning
4
SCIM Client Provisioning
Scenarios Cloud-to-Enterprise POLLING The Event Receiver already has SCIM access to the Event Transmitter service provider (includes HTTP credentials and endpoint). Event Receivers and Transmitters can agree out-of-band on SET/JWT security requirements including use of signing and/or encryption to be documented in a Stream Configuration. SCIM Service Provider SCIM Event Stream SCIM Commands Events via HTTP GET Long Poll & POST Acks Firewall SCIM Client Provisioning
5
SCIM Client Provisioning
Scenarios Cloud-to-Mobile Application PUSH The Event Receiver already has SCIM access to the Event Transmitter service provider (includes HTTP credentials and endpoint). Event Receivers and Transmitters can agree out-of-band on SET/JWT security requirements including use of signing and/or encryption to be documented in a Stream Configuration. SCIM Service Provider SCIM Event Stream SCIM Commands Events via SMS SCIM Client Provisioning
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.