...
The following system identity types are supported:
Identity Type | Description |
---|---|
| A default SCIM user with the properties defined in section Section 4.1 of rfc7643 (Standard User Schema) and Section 4.3 of rfc7643 (Enterprise User Schema). You can extend those properties by creation system identity type attributes in the CoreOne Suite Admin UI. |
SCIM User
The following user attributes can be manged by default:
Info |
---|
SCIM supports complex and multi value attributes. Attributes in the CoreOne Suite are - by default - flat objects. To simplify this use case the system identity type attributes follow a simple transformation. The complex SCIM name conists of a familyName, givenName and so on. Within the CoreOne Suite we simply track them as name.familyName, name.givenName and so on. |
Attribute | Description |
---|---|
| The username of the user |
| The formatted name, similar to the display name |
| The family name of the user |
| The given name of the user |
| The middle name of the user |
| The honorific prefix(es) of the user |
| The honorific suffix(es) of the User |
| The display name of the user |
| The nick name of the user |
| An URI that locates a users profile |
| The title of the user |
| The type of a user should an application or system support that |
| The prefered language in the format of Section 5.3.5 of rfc7231. |
| The users default location as specified in https://datatracker.ietf.org/doc/html/rfc5646 |
| The users time zone as specified in https://datatracker.ietf.org/doc/html/rfc6557 |
| An indication whether the user is active or not |
| A |
| A |
| A |
| A |
| A |
Info |
---|
Note that the section 4.1.2 of rfc 7643 specifies a |
...
The following system resource types are supported:
Identity Type | Description |
---|---|
| A SCIM Group according to section 4.2 of rfc 7643 |
Target System Parameters
Whenever you connect a SAP system to the CoreOne Suite you will need to specify the following parameters.
Parameter | Mandatory | Example | Description |
---|---|---|---|
| ✅ | https://scim.webapp.com | The base url of the SCIM endpoint |
| ❌ | https://scim.webapp.com/login | The endpoint where the authentication for the SCIM endpoint has to be performed This URL gets called together with the Username and Password as HTTP Basic Authentication request and has to return a Bearer Token in the form of { Token: ““ } |
| ❌ | svc_cos | The user name to be used for authentication |
| ❌ | 🔑 * * * * * * * | The password of the user |
| ✅ | false | If the SSL handshake can not be performed because of invalid certificates. Be very cautions with this and only disable it if really necessary. |
| ✅ | Updates done via PATCH method | Defines with which HTTP method identity updates should be sent. Currently PATCH and PUT are supported |
| ✅ | Updates done via PATCH method | Defines with which HTTP method resource updates should be sent. Currently PATCH and PUT are supported |
| ✅ | false | If true, sets all the missing attributes on the entity sent back by the target system to the default values of their respective data types. Usually the target system sends back the whole entity with all attributes so this doesn’t need to be enabled. |
Context Assignment
The SCIM Connector supports the assignment context as described here. As this assignment context is not part of the standard definition in SCIM, we made use of SCIMs capability to extend the schema. Whenever an assignment is made with a context, first the assignment context transformations are applied and then they are provisioned in as the relations
property.
...
Info |
---|
Note: We still pass the members path, even if the system supports the context. The regular members path should be ignored by the system. |
Identity functions
The following identity functions are supported:
Supported | |
create/delete identities | |
provisioning identities | |
update identities | |
provisioning identity updates | |
deprovision identities | |
cleanup of inactive identities active | - |
check password changed active | - |
Resources functions
The following resource functions are supported:
Supported | |
create/delete resources | |
provision resources | |
update resources | |
provisioning resource changes | |
deprovisioning resources | |
provisioning resource allocations | |
deprovisioning resource allocations | |
provisioning resources-resource allocations | - |
Deprovisioning resource resource allocations | - |
Cleanup functions
The following cleanup functions are supported:
Supported | |
Is available in the expected/actual comparison log | |
Clean up expected/actual | - |
Read back user account properties | - |
Resource identity assignments Target system cleanup | - |
Resource-resource assignments Target system cleanup | - |