Presentation is loading. Please wait.

Presentation is loading. Please wait.

SCIM Use Case Scenario.

Similar presentations


Presentation on theme: "SCIM Use Case Scenario."— Presentation transcript:

1 SCIM Use Case Scenario

2 Presumptions SCIM Triggers SCIM Security Model PII

3 SCIM Client Provisioning
Scenarios Cloud-to-Enterprise PUSH and Cloud-to-Cloud PUSH The Event Receiver already has SCIM access to the Event Transmitter service provider (includes HTTP credentials and endpoint). Event Receivers and Transmitters can agree out-of-band on SET/JWT security requirements including use of signing and/or encryption to be documented in a Stream Configuration. SCIM Service Provider SCIM Event Stream SCIM Commands SCIM Events SCIM Client Provisioning

4 SCIM Client Provisioning
Scenarios Cloud-to-Enterprise POLLING The Event Receiver already has SCIM access to the Event Transmitter service provider (includes HTTP credentials and endpoint). Event Receivers and Transmitters can agree out-of-band on SET/JWT security requirements including use of signing and/or encryption to be documented in a Stream Configuration. SCIM Service Provider SCIM Event Stream SCIM Commands Events via HTTP GET Long Poll & POST Acks Firewall SCIM Client Provisioning

5 SCIM Client Provisioning
Scenarios Cloud-to-Mobile Application PUSH The Event Receiver already has SCIM access to the Event Transmitter service provider (includes HTTP credentials and endpoint). Event Receivers and Transmitters can agree out-of-band on SET/JWT security requirements including use of signing and/or encryption to be documented in a Stream Configuration. SCIM Service Provider SCIM Event Stream SCIM Commands Events via SMS SCIM Client Provisioning


Download ppt "SCIM Use Case Scenario."

Similar presentations


Ads by Google