{"id":17862,"date":"2023-12-15T19:50:16","date_gmt":"2023-12-15T19:50:16","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=17862"},"modified":"2024-01-04T19:50:35","modified_gmt":"2024-01-04T19:50:35","slug":"scim-provisioning","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/","title":{"rendered":"SCIM PROVISIONING: What Is It &amp; How Does It Work?","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n<p>SCIM (System for Cross-Domain Identification Management) is an open standard that aids in the automation of the user identity lifecycle management process. SCIM provisioning facilitates communication between cloud-based applications by formalizing the interface between the identity provider (user data platform or directory) and the service provider. Furthermore, we will discuss SCIM Provisioning, how it works, SCIM Auto and OKTA Provisioning, and also the SCIM API.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-scim-provisioning-nbsp\"><span id=\"scim-provisioning\">SCIM Provisioning&nbsp;<\/span><\/h2>\n\n\n\n<p>SCIM provisioning enables enterprises to effectively manage user identities in the cloud by effortlessly adding or removing individuals inside their organization. This not only helps in optimizing budgets and lowering risk, but also streamlines workflows. Additionally, it simplifies communication between cloud-based apps by establishing a standardized connection between the identity provider (a platform or directory containing user data) and service providers (the applications that are being accessed, such as a SaaS vendor).\u00a0<\/p>\n\n\n\n<p>Before the widespread adoption of Systems for Cross-Domain Identity Management (SCIM), there existed numerous very intricate methods for handling user IDs. Several of these regulations, frequently in the form of custom APIs, continue to exist and face challenges when interacting with current protocols and systems, resulting in significant financial burdens for an organization. Developers created SCIM to simplify this process, making it a widely used standard for integrating identity providers with cloud-based systems.&nbsp;<\/p>\n\n\n\n<p><strong>Read Also:<\/strong> <a href=\"https:\/\/businessyield.com\/tech\/technology\/progress-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">PROGRESS SOFTWARE: Everything You Need to Know<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-scim-provisioning-works\"><span id=\"how-scim-provisioning-works\">How SCIM Provisioning Works<\/span><\/h2>\n\n\n\n<p>Now that you understand what SCIM is and what it does, let&#8217;s look at how it works and the nomenclature it uses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-scim-clients-and-service-providers\"><span id=\"1-scim-clients-and-service-providers\">#1. SCIM Clients and Service Providers<\/span><\/h3>\n\n\n\n<p>SCIM provisioning works on a centralized source of truth for user identities known as the &#8220;client.&#8221; Typically, an identity provider such as Okta or FusionAuth handles user authentication and keeps identifying information for that user.<\/p>\n\n\n\n<p>Many &#8220;service providers,&#8221; often software services that rely on the user&#8217;s identity, can then implement the SCIM protocol. When the user&#8217;s information changes (e.g., they update their email address, phone number, etc.), the SCIM client broadcasts these changes to the service providers using the SCIM protocol.<\/p>\n\n\n\n<p>Let&#8217;s go over how SCIM provisioning works and interacts with identity providers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-saml-scim-and-sso\"><span id=\"2-saml-scim-and-sso\">#2. SAML, SCIM, and SSO<\/span><\/h3>\n\n\n\n<p>If you&#8217;re familiar with identity management protocols and standards, you&#8217;ve heard of SAML and SSO, but let&#8217;s explain how they work or connect with SCIM.<\/p>\n\n\n\n<p>SSO (single sign-on) refers to the ability of a user to sign into a single system and gain access to multiple systems. You&#8217;re probably used to utilizing social media or Google as an authentication mechanism for other websites. This is an example of SSO.<\/p>\n\n\n\n<p>SAML (security assertion markup language) is simply one of the standards that can be used to enable SSO. It specifies how a user&#8217;s identity should be confirmed and how it should be transferred between systems. However, SAML is not the sole standard for enabling authentication; OAuth and OpenID are other popular choices.<\/p>\n\n\n\n<p>Finally, as previously stated, SCIM outlines how a single user can be kept up to date across various services. As a result, SCIM often collaborates with an SSO provider to help maintain a user&#8217;s identification information.<\/p>\n\n\n\n<p>A user would typically log in using an identity provider (a SCIM client) in a typical process. This identity provider may use a standard such as SAML to provide single sign-on to numerous services. When a user modifies a crucial component of their identity in the identity provider, the endpoints provided by the SCIM protocol are called to update that user in all service providers. As the user updates their name, email, phone number, or contact information, their information is kept up-to-date.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-is-it-important\"><span id=\"why-is-it-important\">Why Is It Important?<\/span><\/h3>\n\n\n\n<p>When it comes to automated lifecycle management, employees no longer need to share or borrow credentials to access programs that they might not even have permission to use. When a user&#8217;s status changes, it also blocks inadvertent access. Furthermore, when users leave a company, ID providers can remove or cancel their accounts across applications, improving organizational security. <a href=\"https:\/\/businessyield.com\/technology\/cloud-business-phone-systems\/\" target=\"_blank\" rel=\"noreferrer noopener\">Automatic de-provisioning<\/a> can lessen the likelihood of a data breach and prevent unauthorized users from entering apps they should no longer have access to. It also reduces the possibility of human mistakes in the manual entry of user data that must be shared between businesses.<\/p>\n\n\n\n<p><strong>Read Also: <\/strong><a href=\"https:\/\/businessyield.com\/tech\/reviews\/obsidian-vs-notion\/\" target=\"_blank\" rel=\"noreferrer noopener\">OBSIDIAN VS NOTION: Which Note-Taking App Is Better?<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-okta-scim-provisioning\"><span id=\"okta-scim-provisioning\">Okta SCIM Provisioning<\/span><\/h2>\n\n\n\n<p>The SCIM protocol can be used to import user digital IDs from Okta (the source system) to your Akamai MFA SCIM application. SCIM provisioning allows you to import user accounts, account privileges, and group memberships automatically.<\/p>\n\n\n\n<p>When a change occurs to a user record in the source system, SCIM provisioning makes sure that both systems automatically sync when\u00a0you notify them of the change.<\/p>\n\n\n\n<p>You can also utilize the attribute mapping feature to alter and match user attributes transmitted between Okta and your SCIM application during the provisioning process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-before-you-begin\"><span id=\"before-you-begin\">Before You Begin<\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create an Okta account.<\/li>\n\n\n\n<li>Verify that every user in your Okta directory has a working email address before sending them the enrollment email. Users who do not have the email attribute field in their Okta user profile filled up will not receive the enrollment email.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-add-scim-provisioning\"><span id=\"add-scim-provisioning\">Add SCIM provisioning<\/span><\/h4>\n\n\n\n<p>Set up your SCIM service in Akamai MFA using this approach to receive your authentication token and base URL. In the following steps of the setup process, you can utilize your authentication credentials to enable the import of user data from Okta to Akamai MFA.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Select Multi-factor Authentication &gt; Identity &amp; Users &gt; User Provisioning from the Enterprise Center navigation menu.<\/li>\n\n\n\n<li>Add Provisioning (+) is selected.<\/li>\n\n\n\n<li>Select the SCIM 2.0 provisioning type and give it a unique name on the User Provisioning page.<\/li>\n\n\n\n<li>Click the Save and Deploy button.<\/li>\n<\/ul>\n\n\n\n<p>You&#8217;ve just created your API token and base URL, which you&#8217;ll need in the next steps of setting.<\/p>\n\n\n\n<p>You can additionally enable the following settings on the provisioning setup page:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Send registration emails. Toggle this option to send enrollment emails to new users whose accounts have been synchronized with Akamai MFA. Once their accounts have been imported from Okta, new users will receive an email with an enrollment link that allows them to register their authentication device in the Akamai MFA service.<\/li>\n\n\n\n<li>Include users who were manually provisioned. Toggle on to update the source of provisioning for existing Akamai MFA users. With this setting enabled, the SCIM client writes to users and groups that are not connected to any provisioning method (manually provisioned), which will cause their provisioning method to point to that SCIM integration. This enables the SCIM integration to claim ownership of existing users rather than forcing them to re-enroll if they already have accounts.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-scim-provisioning-benefits\"><span id=\"scim-provisioning-benefits\">SCIM Provisioning Benefits<\/span><\/h3>\n\n\n\n<p>SCIM&#8217;s most significant benefit is that it provides a standardized, secure technique for sharing information between IT systems. This enables cross-domain compatibility without the need for costly, specialized integrations.&nbsp;<\/p>\n\n\n\n<p>SCIM supports single sign-on (SSO), which improves security compliance while reducing the attack surface that bad actors can exploit. Both SCIM group provisioning and individual user access are automatic, which cuts down on manual work and the chance of mistakes and &#8220;zombie&#8221; accounts. Modern SCIM technology makes employee onboarding and offboarding easier while also providing visibility into all IT infrastructure.<\/p>\n\n\n\n<p>Finally, SCIM auto-provisioning boosts overall organizational productivity. SCIM, in collaboration with access management, decreases the time required to allow access to backend infrastructure, offering employees a productivity boost in addition to freeing up IT personnel to focus on other useful activities. These advantages boost the return on investment (ROI) on IT infrastructure while lowering the total cost of ownership (TCO).&nbsp;<\/p>\n\n\n\n<p><strong>Read also<\/strong>: Provisioning in<a href=\"https:\/\/businessyield.com\/tech\/technology\/provisioning-in-it-software-what-does-it-mean\/\" target=\"_blank\" rel=\"noreferrer noopener\"> IT Software: What Does It Mean?<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-scim-api\"><span id=\"scim-api\">SCIM API<\/span><\/h2>\n\n\n\n<p>This will lead you through some common user management operations using our SCIM API. Outside of the user administration UI, the SCIM API allows you to view, create, change, and delete users and groups programmatically.<\/p>\n\n\n\n<p>Also, it will walk you through some of the most frequent procedures for adding users to SCIM API from an identity provider service and maintaining them from there. It is intended to supplement our main SCIM API resource.<\/p>\n\n\n\n<p>Moreover, it is important to note that when you use automatic user management, your user groups are imported into SCIM API. This means you can&#8217;t add users to groups using our user management UI. Your identity provider will build and administer the groups.<\/p>\n\n\n\n<p>Once your user groups are in New Relic, you must utilize our Access Management UI to grant those groups access to roles and accounts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-configure-your-authentication-domain-for-scim\"><span id=\"1-configure-your-authentication-domain-for-scim\">#1. Configure Your Authentication Domain for SCIM<\/span><\/h3>\n\n\n\n<p>You must first enable SCIM for your authentication domain before you can use the SCIM API. Remember that the API access token will only show up once after you save the settings, so save it somewhere safe in case you need it again.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-create-users-and-user-groups-in-your-system\"><span id=\"2-create-users-and-user-groups-in-your-system\">#2. Create Users and User Groups in Your System<\/span><\/h3>\n\n\n\n<p>Scripts often use the SCIM API to import users and groups into New Relic from a database or a third-party identity provider that does not contain New Relic pre-configured configurations.<\/p>\n\n\n\n<p>Continue to learn how to connect to the SCIM API if you wish to use the SCIM API custom application or for ad-hoc requests.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-access-the-scim-api\"><span id=\"3-access-the-scim-api\">#3. Access the SCIM API<\/span><\/h3>\n\n\n\n<p>The SCIM API can be accessed using the URL for it. You can locate this URL on the authentication domain settings page. Each request to the SCIM API must include a bearer token. The token appears after you save your authentication site setup.<\/p>\n\n\n\n<p>Configure your third-party identity provider to utilize Bearer token permission and enter your API access token. For assistance customizing this, consult the guidelines provided by your identity provider. After that, you&#8217;re ready to import users and groups.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-does-scim-provisioning-stand-for\"><span id=\"what-does-scim-provisioning-stand-for\">What Does SCIM Provisioning Stand For?<\/span><\/h2>\n\n\n\n<p>The System for Cross-Domain Identity Management (SCIM) is an openly recognized standard that streamlines the management of cloud identities and enables automatic user provisioning across many domains.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-the-difference-between-saml-and-scim-provisioning\"><span id=\"what-is-the-difference-between-saml-and-scim-provisioning\">What Is the Difference Between SAML and SCIM Provisioning?<\/span><\/h2>\n\n\n\n<p>SAML primarily addresses the establishment of user access through authentication and authorization policies, whereas SCIM facilitates the automation of provisioning and de-provisioning across various applications and systems in the business<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-the-difference-between-jit-and-scim-provisioning\"><span id=\"what-is-the-difference-between-jit-and-scim-provisioning\">What Is the Difference Between JIT and SCIM Provisioning?<\/span><\/h2>\n\n\n\n<p>JIT provisioning streamlines the process of creating accounts, while SCIM provisioning automates the processes of providing, de-provisioning, and managing accounts. Regardless of the scenario, it is crucial to emphasize that the service provider must have the capability to support the specific protocol for it to be feasible. At present, there are a greater number of apps that provide support for just-in-time (JIT) compilation compared to those that support the Smart Common Input Method (SCIM).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-does-scim-provide-authentication\"><span id=\"does-scim-provide-authentication\">Does SCIM Provide Authentication?<\/span><\/h2>\n\n\n\n<p>The SCIM authentication service expands upon the SCIM standard by facilitating authentication requests and managing users and groups. All SCIM searches need authentication,&nbsp;&nbsp;except for the one that are about Schemas or ServiceProviderConfig objects. If the request lacks authentication, a 401 Unauthorized message is delivered.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-is-scim-a-protocol\"><span id=\"is-scim-a-protocol\">Is SCIM a Protocol?<\/span><\/h2>\n\n\n\n<p>To access Version 1.1 of the SCIM standard, please refer to our SCIM 1.1 reference. The SCIM protocol is a REST protocol at the application level that is used to provision and manage identity data on the web. The protocol facilitates the establishment, detection, retrieval, and alteration of fundamental identity resources.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-scim-provisioning-in-okta\"><span id=\"what-is-scim-provisioning-in-okta\">What Is SCIM Provisioning in Okta?<\/span><\/h2>\n\n\n\n<p>Provisioning encompasses the complete procedure of transferring lifetime information, whereas SCIM serves as the standardized framework for conducting these exchanges. The CRUD actions Create, Read, Update, and Deprovision (instead of Delete) are the best way to describe the Okta provisioning process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-do-we-use-provisioning\"><span id=\"why-do-we-use-provisioning\">Why Do We Use Provisioning?<\/span><\/h2>\n\n\n\n<p>Efficient provisioning is crucial, as it ensures the security of IT systems and allows businesses to optimize the utilization of information technology resources for maximum profitability and productivity. Embark on your path towards achieving consistent application performance while effectively minimizing expenses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-use-scim-api\"><span id=\"how-to-use-scim-api\">How To Use Scim API?<\/span><\/h2>\n\n\n\n<p>Your client has to include a bearer token with every request to use the SCIM API. After you save your authentication domain setup, the token will be presented. Bearer token authorization should be enabled and your API access token should be inputted into any third-party identity provider you&#8217;re utilizing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><span id=\"references\">References<\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.sailpoint.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">sailpoint.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.merge.dev\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Merge.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/techdocs.broadcom.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">tec<\/a><a href=\"https:\/\/techdocs.broadcom.com\/\">hdocs.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.strongdm.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Strongdm<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newrelic.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Newrelic<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.pingidentity.com\/en.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">pingidentity<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-related-articles\"><span id=\"related-articles\">Related Articles<\/span><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/saml-vs-oauth\/\" target=\"_blank\" rel=\"noreferrer noopener\">SAML VS OAUTH: Full Comparison 2023<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/sailpoint\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sailpoint: Features, Review, Competitors &amp;amp; More<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/what-is-okta\/\" target=\"_blank\" rel=\"noreferrer noopener\">WHAT IS OKTA: How Does Okta Work &amp;amp; What You Use It For?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/how-to\/how-to-create-a-facebook-group\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Create a Facebook Group: Quick and Easy<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/reviews\/api-connect\/\" target=\"_blank\" rel=\"noreferrer noopener\">API CONNECT: Reviews, Pricing, Features, Pros, Cons &amp;amp; More<\/a><\/li>\n<\/ol>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"SCIM (System for Cross-Domain Identification Management) is an open standard that aids in the automation of the user&hellip;\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":292,"featured_media":18005,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[35],"tags":[],"class_list":{"0":"post-17862","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SCIM PROVISIONING: What Is It &amp; How Does It Work?<\/title>\n<meta name=\"description\" content=\"SCIM provisioning works as an open standard that aids in the automation of the user identity lifecycle management process. Learn about SCIM API and Okta provisioning.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SCIM PROVISIONING: What Is It &amp; How Does It Work?\" \/>\n<meta property=\"og:description\" content=\"SCIM provisioning works as an open standard that aids in the automation of the user identity lifecycle management process. Learn about SCIM API and Okta provisioning.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/\" \/>\n<meta property=\"og:site_name\" content=\"Business Yield Technology\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-15T19:50:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-04T19:50:35+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2024\/01\/turn-off-google-assistance-26.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"pearl\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pearl\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/\",\"url\":\"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/\",\"name\":\"SCIM PROVISIONING: What Is It &amp; How Does It Work?\",\"isPartOf\":{\"@id\":\"https:\/\/businessyield.com\/tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2024\/01\/turn-off-google-assistance-26.jpg?fit=500%2C250&ssl=1\",\"datePublished\":\"2023-12-15T19:50:16+00:00\",\"dateModified\":\"2024-01-04T19:50:35+00:00\",\"author\":{\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/833708b8bd1f2131d146f2b7e806bee3\"},\"description\":\"SCIM provisioning works as an open standard that aids in the automation of the user identity lifecycle management process. Learn about SCIM API and Okta provisioning.\",\"breadcrumb\":{\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2024\/01\/turn-off-google-assistance-26.jpg?fit=500%2C250&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2024\/01\/turn-off-google-assistance-26.jpg?fit=500%2C250&ssl=1\",\"width\":500,\"height\":250,\"caption\":\"Image by freepik\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/businessyield.com\/tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SCIM PROVISIONING: What Is It &amp; How Does It Work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/businessyield.com\/tech\/#website\",\"url\":\"https:\/\/businessyield.com\/tech\/\",\"name\":\"Business Yield Technology\",\"description\":\"Best Tech Reviews, Apps, Phones, &amp; Gaming\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/businessyield.com\/tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/833708b8bd1f2131d146f2b7e806bee3\",\"name\":\"pearl\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/16bf3b7dc8dd3a03e4a5e0c40a4c610cc5c4ac382b6bf5c1bae85cde2b2271d9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/16bf3b7dc8dd3a03e4a5e0c40a4c610cc5c4ac382b6bf5c1bae85cde2b2271d9?s=96&d=mm&r=g\",\"caption\":\"pearl\"},\"description\":\"Goodness Chinenyenwa Pearl is a very dedicated and skilled writer who is determined to make a big difference in the success of many businesses. Due to her unwavering commitment to the intricate details of business writing, along with his deep understanding of SEO strategies and expert management skills on content creation, she stands out as a unique asset. As shown by her track record, Goodness Chinenyenwa Pearl consistently possesses a unique set of skills that not only helps businesses grow but also guarantees more exposure and contact for any brand fortunate enough to be linked with her. Pearl's unwavering commitment to high standards and her all-around approach to professional work make her an invaluable asset in today's constantly changing business world.\",\"url\":\"https:\/\/businessyield.com\/tech\/author\/pearl\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SCIM PROVISIONING: What Is It &amp; How Does It Work?","description":"SCIM provisioning works as an open standard that aids in the automation of the user identity lifecycle management process. Learn about SCIM API and Okta provisioning.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/","og_locale":"en_US","og_type":"article","og_title":"SCIM PROVISIONING: What Is It &amp; How Does It Work?","og_description":"SCIM provisioning works as an open standard that aids in the automation of the user identity lifecycle management process. Learn about SCIM API and Okta provisioning.","og_url":"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/","og_site_name":"Business Yield Technology","article_published_time":"2023-12-15T19:50:16+00:00","article_modified_time":"2024-01-04T19:50:35+00:00","og_image":[{"width":500,"height":250,"url":"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2024\/01\/turn-off-google-assistance-26.jpg","type":"image\/jpeg"}],"author":"pearl","twitter_card":"summary_large_image","twitter_misc":{"Written by":"pearl","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/","url":"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/","name":"SCIM PROVISIONING: What Is It &amp; How Does It Work?","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/#primaryimage"},"image":{"@id":"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2024\/01\/turn-off-google-assistance-26.jpg?fit=500%2C250&ssl=1","datePublished":"2023-12-15T19:50:16+00:00","dateModified":"2024-01-04T19:50:35+00:00","author":{"@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/833708b8bd1f2131d146f2b7e806bee3"},"description":"SCIM provisioning works as an open standard that aids in the automation of the user identity lifecycle management process. Learn about SCIM API and Okta provisioning.","breadcrumb":{"@id":"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/#primaryimage","url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2024\/01\/turn-off-google-assistance-26.jpg?fit=500%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2024\/01\/turn-off-google-assistance-26.jpg?fit=500%2C250&ssl=1","width":500,"height":250,"caption":"Image by freepik"},{"@type":"BreadcrumbList","@id":"https:\/\/businessyield.com\/tech\/technology\/scim-provisioning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/businessyield.com\/tech\/"},{"@type":"ListItem","position":2,"name":"SCIM PROVISIONING: What Is It &amp; How Does It Work?"}]},{"@type":"WebSite","@id":"https:\/\/businessyield.com\/tech\/#website","url":"https:\/\/businessyield.com\/tech\/","name":"Business Yield Technology","description":"Best Tech Reviews, Apps, Phones, &amp; Gaming","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/businessyield.com\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/833708b8bd1f2131d146f2b7e806bee3","name":"pearl","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/16bf3b7dc8dd3a03e4a5e0c40a4c610cc5c4ac382b6bf5c1bae85cde2b2271d9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/16bf3b7dc8dd3a03e4a5e0c40a4c610cc5c4ac382b6bf5c1bae85cde2b2271d9?s=96&d=mm&r=g","caption":"pearl"},"description":"Goodness Chinenyenwa Pearl is a very dedicated and skilled writer who is determined to make a big difference in the success of many businesses. Due to her unwavering commitment to the intricate details of business writing, along with his deep understanding of SEO strategies and expert management skills on content creation, she stands out as a unique asset. As shown by her track record, Goodness Chinenyenwa Pearl consistently possesses a unique set of skills that not only helps businesses grow but also guarantees more exposure and contact for any brand fortunate enough to be linked with her. Pearl's unwavering commitment to high standards and her all-around approach to professional work make her an invaluable asset in today's constantly changing business world.","url":"https:\/\/businessyield.com\/tech\/author\/pearl\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2024\/01\/turn-off-google-assistance-26.jpg?fit=500%2C250&ssl=1","jetpack_sharing_enabled":true,"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/17862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/users\/292"}],"replies":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/comments?post=17862"}],"version-history":[{"count":6,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/17862\/revisions"}],"predecessor-version":[{"id":18016,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/17862\/revisions\/18016"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media\/18005"}],"wp:attachment":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media?parent=17862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/categories?post=17862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/tags?post=17862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}