SCIM Gateway

Overview

UNIFYBroker can act as a SCIM 2.0 server, enabling interactions with identity managers and cloud platforms using the SCIM 2.0 specification.

Usage

A SCIM gateway enables create/read/update/delete operations against the adapter entity contexts in UNIFYBroker using the SCIM 2.0 specification. For details on the specification, see rfc7643.

Configuration

In addition to the common gateway configuration shared by all gateways, the SCIM gateway requires the following by way of configuration:

Image 4613

Image 4616

NameDescription
User Adapter The target adapter that contains User objects.
Group Adapter The target adapter that contains Group objects.
Address The address that the endpoint is hosted on.
Audience The optional audience claim to validate. This value is provided by the service provider and is often of the form of a unique identifier. If provided, the authentication bearer token must contain an audience claim with this value.
Tenant The optional tenant claim to validate. This value is provided by the service provider, and is often part of the url for the directory, e.g. https://{tenant}.example.com/. If provided, the authentication bearer token must contain an tenant claim with this value.
User ID Lookup Field The field in the User Adapter to use when looking up the ID for references, e.g. for Manager and Members.
User mappings Schema mapping between SCIM fields and Adapter fields for the User object.
Group mappings Schema mapping between SCIM fields and Adapter fields for the Group object.

SCIM Attribute Mapping

The following tables details the mappings and the SCIM attribute path they get mapped to.

User

MappingSCIM Attribute Path
activeactive
externalIdexternalId
displayNamedisplayName
departmentdepartment
preferredLanguagepreferredLanguage
titletitle
usernameusername
managermanager
employeeNumberemployeeNumber
faxNumberphoneNumbers[type eq "fax"].value
givenNamename.givenName
workEmailemails[type eq "work"].value
mobilePhoneNumberphoneNumbers[type eq "mobile"].value
workPostalCodeaddresses[type eq "work"].postalCode
otherEmailemails[type eq "other"].value
otherAddressFormattedaddresses[type eq "other"].formatted
workStreetAddressaddresses[type eq "work"].streetAddress
familyNamename.familyName
workPhoneNumberphoneNumbers[type eq "work"].value
organizationurn:ietf:params:scim:schemas:extension:enterprise:2.0:User:organization
divisionurn:ietf:params:scim:schemas:extension:enterprise:2.0:User:division
workLocalityaddresses[type eq "work"].locality
workCountryaddresses[type eq "work"].country
workRegionaddresses[type eq "work"].region
costCenterurn:ietf:params:scim:schemas:extension:enterprise:2.0:User:costCenter
formattedNamename.formatted

Group

MappingSCIM Attribute Path
displayNamedisplayName
externalIdexternalId
membersmembers
securityEnabledsecurityEnabled

Azure AD Configuration

When configuration the Azure AD enterprise applications provisioning for use with the SCIM Gateway ensure the following are addressed:

  • The Tenant URL must be provided in the form of <host>:<port>/scim. Historically AAD enterprise apps added the /scim path automatically. For new configurations it must be added manually.
  • The Secret Value must be left empty. If a value is provided it will be used as the authentication bearer token, which is not compatible with the SCIM gateway. Left empty, a bearer token will be generated by Azure AD, and this is what the SCIM gateway expects.

Is this article helpful for you?

+1

Browse to the Azure AD admin center for the instance of Azure AD you wish to connect UNIFYBroker with.

https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview

Select App registrations, then Endpoints, then Federation Metadata Document. Record the GUID in the URL, this is your Audience.

https://login.microsoftonline.com/614a25e0-eb80-4742-ae55-9a038eb6078e/federationmetadata/2007-06/federationmetadata.xml