The Idaptive Developer Program

SCIM Client Inbound Configuration

User Management Overview

In order to initiate the Inbound Provisioning Configuration, you need to create a user who can access and edit an OAuth2 client app. Once this is established, the authenticated user can create an OAuth 2.0 Client App to retrieve a Bearer Token. This Bearer Token validates the SCIM system when imported to a RESTful API-testing program.

Creating a SCIM User with access to an OAuth2 Client app

  1. Log in to the Admin Portal with an administrative account.
  2. Click Core Services > Users > Add User.
  3. Give your user a login name, display name, and password.
  4. In the Status section in the account information page, select Is OAuth confidential client in order to change your user's permission settings, then click Create User.
  1. Create a new role that authorizes access to the OAuth2 App.
  2. Click Core Services > Roles > Add Role.
  3. Enter a suitable name for the SCIM role (e.g. SCIM Client) and save the role
  1. On the Administrative Rights page, add the User Management and Role Management rights. These allow any user added to this role to edit user and role settings in the SCIM system.
  1. Navigate to the Members page, then click *Add to add a new member to the role. Type the username created previously to find your user.

OAuth 2.0 Client Overview

The OAuth 2.0 Client App allows third-party applications to obtain access to user information. Third party applications can use HTTP requests including GET, POST, PUT in order to communicate with the user interface and make changes to user information. The following steps describe how to create an OAuth 2.0 Client App and configure it so that the SCIM User can access it, as well as making sure that it can easily run when applied to an API testing application.

Add and configure the SCIM Client Application

  1. Log in to the Admin Portal with administrative credentials.
  2. Click Web Apps > Add Web Apps, then click Add next to OAuth2 Client.
  1. Add a distinctive name to your application and personalize it by including a description and optionally a logo.
  1. On the General Usage page, make sure that the Client ID Type is Confidential, Must be OAuth Client (users with the OAuth role can access the application).
  1. On the Tokens page, select Client Creds.
  1. On the Scope page, add a new scope by clicking Add and enter a name for the scope.
  2. Under Allowed Rest APIs, click Add and then enter scim* in the REST Regex Box.
  1. Navigate to the Permissions page, then add the role you created previously.

The application is now deployed.

  1. Copy the bearer token so you can authenticate with the app when you test the endpoints.
    1. On the OAuth2 Client app, select Actions > Create Bearer Token and enter the OAuth 2.0 Client user information.
    2. Copy the Bearer Token listed.
      This Bearer Token will be used in order to authenticate your access to the scim endpoints.

Updated about a year ago

SCIM Client Inbound Configuration

Suggested Edits are limited on API Reference Pages

You can only suggest edits to Markdown body content, but not to the API spec.