Learn about configuring Cross-domain Identity Management (SCIM) on Aptible
Aptible has implemented SCIM 2.0 (System for Cross-domain Identity Management) to streamline the management of user identities across various systems. This implementation adheres closely to RFC 7643, ensuring standardized communication and data exchange. SCIM 2.0 simplifies provisioning by automating the processes for creating, updating, and deactivating user accounts and managing roles within your organization. By integrating SCIM, Aptible enhances your ability to manage user data efficiently and securely across different platforms.
We offer detailed guides to help you set up provisioning with your Identity Provider (IdP). These guides cover the most commonly used providers:
These resources will walk you through the steps necessary to integrate SCIM with your preferred provider, ensuring a seamless and secure setup.
SCIM (System for Cross-domain Identity Management) is a protocol designed to simplify user identity management across various systems. It enables automated processes for creating, updating, and deactivating user accounts. The main components of SCIM include:
A SCIM token is valid for one year. After the year, if it expires, you will receive an error in your IDP indicating that your token is invalid.
Aptible leverages Roles instead of Groups. Despite this, the functionality is similar, and SCIM Groups are mapped to Aptible Roles. This mapping ensures that permissions and access controls are maintained consistently.
Aptible aims to continually enhance support for SCIM protocol components. However, some parts are not currently implemented:
While the SCIM protocol supports extensive filtering capabilities, Aptible’s primary use case for filtering is straightforward. Aptible checks if a newly created user or group exists in your application based on a matching identifier. Therefore, supporting the eq
(equals) operator is sufficient.
When integrating SCIM with an account that already has users, SCIM will:
To disable SCIM and manage the associated data within your Aptible Organization:
Retaining Created Roles and Users: If you want to keep the roles and users created by SCIM, simply disable SCIM as an Aptible Organization owner. This action will remove the SCIM association but leave the created users and roles intact.
Removing SCIM-Created Data: If you wish to remove users and roles created by SCIM, begin by unassigning any users and roles in your Identity Provider (IDP) that were created via SCIM. This action will soft delete these objects from your Aptible Organization. After all assignments have been removed, you can then deactivate the SCIM integration, ensuring a clean removal of all associated data.
Aptible’s SCIM implementation uses the OAuth 2.0 Authorization Code grant flow for authentication. It does not support the Client Credentials or Resource Owner Password Credentials grant flows. The Authorization Code grant flow is preferred for SaaS and cloud integrations due to its enhanced security.
Aptible’s SCIM implementation includes the following features:
Aptible follows the SCIM 2.0 guidelines, so you should be able to integrate with us as long as the expected attributes are correctly mapped.
📘 Note We cannot guarantee the operation of an integration that has not been tested by Aptible. Proceeding with an untested integration is at your own risk.
Required Attributes:
userName
: The unique identifier for the user, essential for correct user identification.displayName
: The name displayed for the user, typically their full name; used in interfaces and communications.active
: Indicates whether the user is active (true
) or inactive (false
); crucial for managing user access.externalId
: A unique identifier used to correlate the user across different systems; helps maintain consistency and data integrity.Optional but recommended Attributes:
givenName
: The user’s first name; can be used as an alternative in conjunction with familyName to displayName
.familyName
: The user’s last name; also serves as an alternative in conjunction with givenName to displayName
.Supported Operations
userName
, id
, meta.created
, and meta.lastModified
.startIndex
and count
for controlled data fetching.userName
attribute.By ensuring these attributes are mapped correctly, your Identity Provider should integrate seamlessly with our system.
For more detailed instructions on setting up SCIM with Aptible, please refer to the Aptible SCIM documentation or contact support for assistance.
Learn about configuring Cross-domain Identity Management (SCIM) on Aptible
Aptible has implemented SCIM 2.0 (System for Cross-domain Identity Management) to streamline the management of user identities across various systems. This implementation adheres closely to RFC 7643, ensuring standardized communication and data exchange. SCIM 2.0 simplifies provisioning by automating the processes for creating, updating, and deactivating user accounts and managing roles within your organization. By integrating SCIM, Aptible enhances your ability to manage user data efficiently and securely across different platforms.
We offer detailed guides to help you set up provisioning with your Identity Provider (IdP). These guides cover the most commonly used providers:
These resources will walk you through the steps necessary to integrate SCIM with your preferred provider, ensuring a seamless and secure setup.
SCIM (System for Cross-domain Identity Management) is a protocol designed to simplify user identity management across various systems. It enables automated processes for creating, updating, and deactivating user accounts. The main components of SCIM include:
A SCIM token is valid for one year. After the year, if it expires, you will receive an error in your IDP indicating that your token is invalid.
Aptible leverages Roles instead of Groups. Despite this, the functionality is similar, and SCIM Groups are mapped to Aptible Roles. This mapping ensures that permissions and access controls are maintained consistently.
Aptible aims to continually enhance support for SCIM protocol components. However, some parts are not currently implemented:
While the SCIM protocol supports extensive filtering capabilities, Aptible’s primary use case for filtering is straightforward. Aptible checks if a newly created user or group exists in your application based on a matching identifier. Therefore, supporting the eq
(equals) operator is sufficient.
When integrating SCIM with an account that already has users, SCIM will:
To disable SCIM and manage the associated data within your Aptible Organization:
Retaining Created Roles and Users: If you want to keep the roles and users created by SCIM, simply disable SCIM as an Aptible Organization owner. This action will remove the SCIM association but leave the created users and roles intact.
Removing SCIM-Created Data: If you wish to remove users and roles created by SCIM, begin by unassigning any users and roles in your Identity Provider (IDP) that were created via SCIM. This action will soft delete these objects from your Aptible Organization. After all assignments have been removed, you can then deactivate the SCIM integration, ensuring a clean removal of all associated data.
Aptible’s SCIM implementation uses the OAuth 2.0 Authorization Code grant flow for authentication. It does not support the Client Credentials or Resource Owner Password Credentials grant flows. The Authorization Code grant flow is preferred for SaaS and cloud integrations due to its enhanced security.
Aptible’s SCIM implementation includes the following features:
Aptible follows the SCIM 2.0 guidelines, so you should be able to integrate with us as long as the expected attributes are correctly mapped.
📘 Note We cannot guarantee the operation of an integration that has not been tested by Aptible. Proceeding with an untested integration is at your own risk.
Required Attributes:
userName
: The unique identifier for the user, essential for correct user identification.displayName
: The name displayed for the user, typically their full name; used in interfaces and communications.active
: Indicates whether the user is active (true
) or inactive (false
); crucial for managing user access.externalId
: A unique identifier used to correlate the user across different systems; helps maintain consistency and data integrity.Optional but recommended Attributes:
givenName
: The user’s first name; can be used as an alternative in conjunction with familyName to displayName
.familyName
: The user’s last name; also serves as an alternative in conjunction with givenName to displayName
.Supported Operations
userName
, id
, meta.created
, and meta.lastModified
.startIndex
and count
for controlled data fetching.userName
attribute.By ensuring these attributes are mapped correctly, your Identity Provider should integrate seamlessly with our system.
For more detailed instructions on setting up SCIM with Aptible, please refer to the Aptible SCIM documentation or contact support for assistance.