<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-correia-scimusecases-00" category="info" submissionType="IETF">
  <front>
    <title>SCIM Use Cases</title>

    <author initials="P. J." surname="Correia" fullname="Paulo Jorge Correia">
      <organization>Cisco Systems</organization>
      <address>
      </address>
    </author>
    <author initials="P." surname="Dingle" fullname="Pamela Dingle">
      <organization>Microsoft Corporation</organization>
      <address>
      </address>
    </author>

    <date year="2023" month="July" day="31"/>

    
    <workgroup>SCIM</workgroup>
    <keyword>Internet-Draft</keyword> <keyword>SCIM</keyword>

    <abstract>


<?line 18?>

<t>This document provides definitions, overview and selected use cases of the System for Cross-domain Identity Management (SCIM).  It lays out the system's concepts, models, and flows, and it includes user scenarios, use cases, and requirements.</t>



    </abstract>



  </front>

  <middle>


<?line 22?>

<section anchor="introduction"><name>Introduction</name>
<t>This document provides the SCIM definitions, overview, concepts, flows, scenarios, and use cases.  It also provides a list of the requirements derived from the use cases.
   The document's objective helps understanding the design and applicability of the SCIM schema [RFC7643] and SCIM protocol [RFC7644].<br />
   Unlike the practice of some protocols like Application Bridging for Federated Access Beyond web (ABFAB) and SAML2 WebSSO, SCIM provides provisioning and de-provisioning of resources in a separate context from authentication (aka just-in-time provisioning).<br />
   This document will describe the different construct that we have in the SCIM protocol and will describe the most typical use case that we will find in the implementation, will also help identify the interactions between the different orchestrators roles and guide on how each other define the SCIM protocol.<br />
   SCIM is a protocol where it relies on one-to-one interaction, in a HTTP client-server model. Any interaction is based on a trigger that will start a CRUD action on one or many resources.</t>

</section>
<section anchor="terminology"><name>Terminology</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] when they appear in ALL CAPS. These words may also appear in this document in lowercase as plain English words, absent their normative meanings. Here is a list of acronyms and abbreviations used in this document:</t>

<t><list style="symbols">
  <t>CRUD: Create, Read, Update, Delete</t>
  <t>RC: Resource Creator</t>
  <t>RU: Resource Updater</t>
  <t>RM: Resource Manager</t>
  <t>RS: Resource Subscriber</t>
  <t>RO: Resource Object</t>
  <t>RA: Resource Attribute</t>
  <t>ERC: External Resource Creator</t>
  <t>IaaS: Infrastructure as a Service</t>
  <t>JIT: Just In Time</t>
  <t>PaaS: Platform as a Service</t>
  <t>SaaS: Software as a Service</t>
  <t>IDaaS: ID as a Service</t>
  <t>IdM: Identity Manager</t>
  <t>SAML: Security Assertion Markup Language</t>
  <t>SCIM: System for Cross-domain Identity Management</t>
  <t>SSO: Single Sign-On</t>
</list></t>

</section>
<section anchor="scim-components-and-architecture"><name>SCIM Components and Architecture</name>
<t>The System for Cross-domain Identity Management (SCIM) specification is designed to manage resources and services in applications using standards to enable better interoperability, security, and scalability.</t>

<t>The specification suite seeks to build upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models.<br />
The intent of the SCIM specification is to reduce the cost and complexity of resource management operations by providing a common schemas and extension model, as well as binding documents to provide patterns for exchanging this schema using standard protocols. In essence, make it fast, cheap, and easy to move resources in to, out of, and around the applications.<br />
The SCIM scenarios are overviews of user stories designed to help clarify the intended scope of the SCIM effort.</t>

<section anchor="implementation-concepts"><name>Implementation Concepts</name>
<t>To understand the use cases we need to understand 4 different concepts of the protocol, that will describe underlying protocol, the different orchestrators roles, how we start the SCIM interaction and what methods we have to execute the actions.</t>

<section anchor="http-client-server-roles"><name>HTTP Client-Server Roles</name>
<t>HTTP client and server roles are defined in [RFC 9110] and [RFC 9112]- any SCIM interaction requires each participant to play a complementary role.</t>

<section anchor="scim-server-also-known-as-a-scim-service-provider"><name>SCIM Server (also known as a SCIM Service Provider)</name>
<t>An HTTP web application that provides identity information via the SCIM protocol.<br />
A SCIM Server is a RESTful API endpoint offering access to a data model that can be used to push or pull data between two parties. SCIM servers have additional responsibilities such as API Security, managing client identifiers &amp; keys as well as performance management such as API throttling.</t>

</section>
<section anchor="scim-client"><name>SCIM Client</name>
<t>A website or application that uses the SCIM protocol to manage identity data maintained by the service provider.  The client initiates SCIM HTTP requests to a target SCIM Server. <br />
A SCIM Client is active software that can call one or more SCIM servers in order to push or pull data between two parties.</t>

</section>
</section>
<section anchor="orchestrators-roles"><name>Orchestrators Roles</name>
<t>Orchestrators are the operating parties that take part in both sides of a SCIM protocol exchange and have specific roles in the protocol. <br />
A specific element can have one or more orchestrators roles, depending on the type of roles that is delivering in the SCIM architecture.<br />
So far, we have identified the following SCIM orchestrators roles:</t>

<t><list style="symbols">
  <t>Resource Object (RO): Is and object that is going to be manipulated (CRUD) by the different SCIM players, and in the end the ultimate goal to be pass across different systems and to make sure that consistent information is exchange. The Resource Object have attributes that are define by Schemas, an example of that is the SCIM Core Schema defines in [RFC 7643].</t>
  <t>Resource Attributes (RA): Is one element of the Resource Object (RO), it can have a single value or contain multiple values to describe a specific resource and its characteristics, an example of this can be the different attributes for user and/or groups under the SCIM Core Schema defined in [RFC 7643].</t>
  <t>Resource Creator (RC): Is an entity operating in a given service, is responsible of creating the Resource Object (RO) with is Resource Attributes (RA), typically we can see this role in HR or Resource Management applications (like IdM) that are responsible to create resources and be authorities for some or all its attributes.</t>
  <t>Resource Updater (RU): Is an entity that is responsible for update specific attributes (RA) of a Resource Object (RO) or the RO itself. Typically, this role is use in conjunction with other SCIM roles that allow this SCIM entity to manage a specific Resource Attribute (RA).</t>
  <t>Resource Manager (RM): Is an entity that consolidated the resource Objects (RO) from the Resource Creators/Updaters (RC/RU) and make it available for the Resource Subscribers (RS), typically this entity/role is handle by the IDaaS.</t>
  <t>Resource Subscriber (RS): Is an entity that consumes Resource Objects (RO) but that is not authoritative to create them or any of its Resource Attribute (RA), normally this entity is only interested in part of the Resource Objects available in the Resource Manager (RM), typically it is an application that requires information on resources that it operates.</t>
  <t>External Resource Creator (ERC): Is an entity that has information about resources and its attributes, but that doesn’t understand SCIM, typically it is going to provide the information on the resources to the Resources Manager, using non SCIM protocols/mechanisms, an example of this would be a services that gets information about users from an LDAP server and provide it to an IDaaS using some kind of proprietary REST APIs.</t>
</list></t>

<figure><artwork><![CDATA[
   +-------------+ +-------------+   +-------------+ +-------------+
   |(RO) Resource| |(RA) Resource|   |(RO) Resource| |(RA) Resource|
   |   Object1   | |  Attribute1 |   |   Object2   | |  Attribute2 |
   +-------------+ +-------------+   +-------------+ +-------------+
          |               |                 |               |
   +-------------+ +-------------+   +-------------+ +-------------+
   |(RC) Resource| |(RU) Resource|   |(RC) Resource| |(RU) Resource|
   |  Creators   | |  Updaters   |   |  Creators   | |  Updaters   |
   +-------------+ +-------------+   +-------------+ +-------------+
       |               |                 |                |
       +--------+------+-----------------+-------+--------+
                |                                |
                v                                v
       +----------------+              +----------------+
       | (RM) Resource  |              | (RM) Resource  |
       |     Manager    |              |     Manager    |
       +----------------+              +----------------+
                |                                |
       +----------------+              +----------------+
       |                |              |                |
       v                v              v                v
  +-------------+ +-------------+   +-------------+ +-------------+
  |(RS) Resource| |(RS) Resource|   |(RS) Resource| |(RS) Resource|
  |  Subscriber | |  Subscriber |   |  Subscriber | |  Subscriber |
  +-------------+ +-------------+   +-------------+ +-------------+
          |                                  |
    +----------------+                  +----------------+
    |                |                  |                |
    v                v                  v                v
 +-------------+ +-------------+   +-------------+ +-------------+
 |(RO) Resource| |(RO) Resource|   |(RO) Resource| |(RO) Resource|
 |   Object1   | |   Object2   |   |   Object1   | |   Object2   |
 +-------------+ +-------------+   +-------------+ +-------------+
                      Figure 1: SCIM Orchestrators Roles
]]></artwork></figure>

<section anchor="mechanics-behind-resource-object-ro-andor-resource-attributes-ra"><name>Mechanics behind Resource Object (RO) and/or Resource Attributes (RA)</name>
<t>Cover in the previous section it was stated that the RC/RU were authoritative over the RO/RA, that could be achieved using the mutability, concept introduced in [RFC 7644], where they would have readWrite/readOnly capabilities over them and this information would be pass to the RM. <br />
In more complex scenarios where the SCIM element doesn't has direct contact with the RC/RU that create/update a specific RO/RA, then the RM that received the original information will have the ReadWrite capabilities in the mutability field. this can be pass from RM to RM, with this mechanism we can prevent loops. <br />
When different components exist that have bi-direction connection, where they can update each other in different RA (Resource Attributes), there can only be on readWrite for a specific RA, so that we don't enter loops.<br />
This document is not going to give implementation recommendation how the different orchestrators roles should be developed to avoid such loops, but for sure each SCIM services needs to implement the right mechanisms to be prepare for complex scenarios where the RC/RU is not direct connector to the SCIM service.</t>

</section>
</section>
<section anchor="triggers"><name>Triggers</name>
<t>Triggers are actions or activities that may cause a SCIM interaction to occur.  Triggers can occur as a result of business processes like a corporate hiring event, but can also be scheduled events such as a unix bash script running as a chron job, or can be just-in-time events such as SAML assertion arriving at a federated relying party that identifies a not-seen-before user. Triggers can also be standardized events, such as those in the OpenID Shared Signals Framework. Triggers used to allow CRUD (Create, Read, Update, Delete) using SCIM Actions or Operations as it is designed to capture a class of use case that makes sense to the actor requesting it rather than to describe a protocol operation.</t>

<section anchor="periodic-interval-triggers"><name>Periodic Interval Triggers</name>
<t>SCIM client will execute SCIM actions configured at specific interval of time, the interval of time are configured by the client. It can use any of the SCIM actions defined in the next sections.</t>

</section>
<section anchor="event-triggers"><name>Event Triggers</name>
<t>Events triggers can take many formats, for example we could have an SaaS application that send an email to request an SCIM action. Another example could be a device where the trigger can be a message from a mobile application that request a SCIM action from the Client (Device management platform) to the Server (Mobile Application) that impersonates the target device. In fact triggers can be anything and is not going to be exhausted numerated in this use case document.<br />
Event Trigger by nature are asynchronous, and start a SCIM action unlike other triggers that have synchronous behavior.
A recommended implementation of event trigger is using Security Events for SCIM service providers and receivers as specified by the Security Event Tokens (SET) [RFC8417] to create triggers for SCIM actions, details for SCIM profile for Security Event Tokens are available in [draft-ietf-scim-events].<br />
In this specification SCIM Clients may need to be informed of changes that occur over time. This could be achieved through the use of event messages or signals in the form of Security Event Tokens (SET). 
SET tokens convey information about changes that have occurred in a publishing domain that may be of interest to a receiving domain. Unlike SCIM Protocol requests, Security Events do not describe actions that a receiver must take, rather they are simple statements of fact about changes that have already occurred. 
The intent, is to allow the event receiver to determine the best follow-up action to take within the context of the receiving domain.</t>

</section>
<section anchor="application-triggers"><name>Application Triggers</name>
<t>Applications triggers are very specific of the different applications that implement SCIM protocol and can be initiated by the administration interfaces or by the end-user interfaces.<br />
Typically they can be done in the administration consoles of the RM (Resource Managers), RC (Resource Creators) or RU (Resource Updaters) when there is a need for a fast update that can't wait for the next schedule cycle.<br />
An example of the end-user interface to trigger and SCIM action, can be a device and the mobile application that manages it, and where it is his responsibilities to notify the SCIM client (typically an Resource Manager) that the resources attributes of that device have changed, and that the RM need to get the new attributes.</t>

</section>
<section anchor="sso-single-sign-on-triggers"><name>SSO (Single Sign-On) Triggers</name>
<t>This model of the trigger is created for those scenarios where a Single Sign-On flow happens, but for some reason is not able to bring all the RA (Resource Attributes) of a specific RO (Resource Object), so the IdM  (Identity Manager) will implement an update to deliver the additional attributes RA to the RO.</t>

<figure><artwork><![CDATA[
+---------------+                                   +---------------+
|               |                                   |               |
|               |                                   |               |
|               |                                   |     SCIM      |
|    Client     |                (1)                |    Server     | 
|               | <-------------------------------> |               |
|  (typically   |                                   | (typically an |
|   an IdM)     |                (2)                |      SaaS     |
|               | <-------------------------------> | Application)  |   
|               |                                   |               |
|    RC/RU/RM   |                                   |      RS       |
|               |                                   |               |
+---------------+                                   +---------------+
          Figure 2:  SCIM  Flow and Entities map
]]></artwork></figure>

<t><list style="numbers">
  <t>SSO trigger that creates the user and might create some RA (Resource Attributes) of a RO (Resource Object)</t>
  <t>SCIM actions that will complement the attributes created before with an SSO JIT with additional RA (Resource Attributes) of the RO (Resource Objects) created before. <br />
This use case combines the SCIM protocol with other protocols used for Single Sign-On, specially in the use case of JIT (Just in time Provision), specially useful with protocols like SAML that is limit by the number of characters in the URL.</t>
</list></t>

</section>
</section>
<section anchor="scim-actions"><name>SCIM Actions</name>
<t>The SCIM protocol defines interactions between two standardized parties that conform to HTTP RESTful conventions. The protocol enables CRUD operations by corresponding those activities to HTTP verbs such as POST, PUT, GET, DELETE etc.  The protocol itself doesn't assume a direction of data flow, and use cases discussed in section 4 are created using the orchestrator roles and an SCIM entity can have multiple roles, depending on the objective of the use case that we are describing.</t>

<section anchor="client-active-push"><name>Client active Push</name>
<t>Client will use HTTP PUSH to create a RO and will use HTTP PATCH/PUT to update its RA. In this section we will cover the basic constructs and will not detail the most complex use case describe in section 4, since they would be just adding new elements to basic constructs describe bellow.</t>

<section anchor="resource-object-creationupdate-from-client-to-server"><name>Resource Object creation/update from Client to Server</name>
<t>In this model we will have a Client that is going to provide information about a RO and its RA to a Server, that can also be called as SCIM Server in [RFC 7643] and [RFC 7644].</t>

<figure><artwork><![CDATA[
+----------------+                                   +----------------+
|                |                (1)                |                |
|                | --------------------------------> |                |
|                |                                   |                |
|                |                (2)                |      SCIM      |
|     Client     | <-------------------------------- |     Server     |
|   (typically   |                                   |  (typically a  |
|    an IdM)     |                (3)                |   Application) |
|                | --------------------------------> |                |   
|     RM/RC/RU   |                                   |        RS      |
|                |                (4)                |                |
|                | <-------------------------------- |                |
+----------------+                                   +----------------+
              Figure 3: SCIM  Flow and Orchestrator roles maps
]]></artwork></figure>

<t><list style="numbers">
  <t>Before creating/updating a RO/RA the SCIM client will always do a HTTP GET to get current information from the SCIM Server.</t>
  <t>SCIM Server will provide the current information on the resources asked by the SCIM Client.</t>
  <t>Based on the RO and RA returned by the Server, there will be a HTTP POST, PUT, PATCH depending on the operation that the Client want to achieve.</t>
  <t>The Service Provider will return the RO/RA with additional metadata information to allow for audit.</t>
</list></t>

<t>The SCIM client will map to the RM/RC/RU and the Server will map into RS.</t>

</section>
<section anchor="resource-object-creation-from-a-creation-entity"><name>Resource Object creation from a Creation Entity</name>
<t>In this model we will have a Client that is going to provide information about a RO and its RA to a Server, can also be called as Service Provider in [RFC 7643] and [RFC 7644], in this model the Client is just responsible for a limit set of attributes and do not do any management overall, and the Resource management function resides on the Server.</t>

<figure><artwork><![CDATA[
+--------------+                                   +---------------+
|              |                (1)                |               |
|              | --------------------------------> |               |
|              |                                   |               |
|              |                (2)                |     SCIM      |
|    Client    | <-------------------------------- |    Server     |
| (typically   |                                   | (typically an |
|  an HR       |                (3)                |      IdM)     |
| Application) | --------------------------------> |               |   
|              |                                   |     RM/RS     |
|   RC/RU      |                (4)                |               |
|              | <-------------------------------- |               |
+--------------+                                   +---------------+
             Figure 4:  SCIM  Flow and Orchestrator roles maps
   
]]></artwork></figure>
<t><list style="numbers">
  <t>Before creating/updating a RO/RA the SCIM client will always do a HTTP GET to get current information from the SCIM Server.</t>
  <t>SCIM Server will provide the current information on the resources asked by the SCIM Client.</t>
  <t>Based on the RO and RA returned by the Server, there will be a HTTP POST, PUT, PATCH depending on the operation that the Client want to achieve.</t>
  <t>The Service Provider will return the RO/RA with additional metadata information to allow for audit.</t>
</list></t>

<t>The SCIM client will map to the RC/RU and the Server will map into RM/RS. The SCIM client is sometimes called as the "HR Application", because it responsibilities are only on be the creator and updater of the RO and specific number of its RA, the client in this case has no responsibilities on the management of Resources, typically done by an IdM.</t>

</section>
<section anchor="resource-object-creation-from-a-creation-entity-and-consumption-from-an-application"><name>Resource Object creation from a Creation Entity and consumption from an Application</name>
<t>In this model we will have a Client that is going to provide information about a RO and its RA to a Server, this Client is just responsible for a limit set of attributes and do not do any management overall the RO. This SCIM element that is going to manage the RO will then be the Client for other SCIM services that will consume the RO/RA, that might have more RA than the original RO provided by the originator of the RO.</t>

<figure><artwork><![CDATA[
+--------+                +---------------+                 +---------+
|        |     (1)        |               |      (1)        |         |
|        | -------------> |               | --------------> |         |
| Client |                |SCIM Server    |                 |         |
|        |     (2)        |               |      (2)        |  SCIM   |
|        | <------------- |               | <-------------- | Server  |
|        |                |         Client|                 |         | 
|        |     (3)        |               |      (3)        |         |
|        | -------------> |               | --------------> |         |
|        |                |  RM/RS/RC/RU  |                 |         |
| RC/RU  |     (4)        |               |      (4)        |   RS    |
|        | <------------- |               | <-------------- |         |
+--------+                +---------------+                 +---------+
                     Figure 5:  SCIM  Flow and Orchestrator roles maps
]]></artwork></figure>
<t><list style="numbers">
  <t>Before creating/updating a RO/RA the SCIM client will always do a HTTP GET to get current information from the SCIM Server.</t>
  <t>SCIM Server will provide the current information on the resources asked by the SCIM Client.</t>
  <t>Based on the RO and RA returned by the Server, there will be a HTTP POST, PUT, PATCH depending on the operation that the Client want to achieve.</t>
  <t>The Service Provider will return the RO/RA with additional metadata information to allow for audit.</t>
</list></t>

<t>The SCIM client on the left will map to the RC/RU and the Server in the middle will map into RM/RS, the SCIM client on the left is also sometimes called as the "HR Application", because it responsibilities are only on be the creator and updater of the RO and specific number of its RA, the client in this case has no responsibilities in doing any management of the Resources, typically done by an IdM. <br />
The center component as describe is the Server for the client on the left, will act as the Client for the server on the right, which typically is an SaaS application that want to consume RO and its RA from an RM.</t>

</section>
<section anchor="resource-object-creation-from-a-creation-entity-and-consumption-from-an-application-when-different-resource-attributes-are-generated-in-different-entities"><name>Resource Object creation from a Creation Entity and consumption from an Application when different Resource Attributes are generated in different entities</name>
<t>In this model we will have a Client that is going to provide information about a RO and its RA to a Server, this Client is just responsible for a limit set of attributes and do not do any management overall the RO. This SCIM element that is going to manage the RO will then be the Client for other SCIM services that will consume the RO/RA, that might have more RA than the original RO provided by the originator of the RO. 
Now the right SCIM element will have it own RA that needs to be updated in the RM (Resource Manager), that will also update the SCIM element on the left.</t>

<figure><artwork><![CDATA[
 +----------+               +---------------+                +--------+
 |          | -----(1)----> |               | -----(1)-----> |        |
 |  Client  | <----(2)----- |SCIM           | <----(2)------ |  SCIM  |
 |          | -----(3)----> |Server         | -----(3)-----> | Server |
 |          | <----(4)----- |         Client| <----(4)------ |        |
 |          |               |               |                |        |
 |          |               |               |                |        |
 | RC/RU/RS | <----(1)----- |  RM/RS/RC/RU  | <----(1)------ |   RS   |
 |          | -----(2)----> |Client         | -----(2)-----> |        |
 |   SCIM   | <----(3)----- |           SCIM| <----(3)------ | Client |
 |  Server  | -----(4)----> |         Server| -----(4)-----> |        |
 +----------+               +---------------+                +--------+
                 Figure 6:  SCIM  Flow and Orchestrator roles maps
   
]]></artwork></figure>
<t><list style="numbers">
  <t>Before creating/updating a RO/RA the SCIM client will always do a HTTP GET to get current information from the SCIM Server.</t>
  <t>SCIM Server will provide the current information on the resources asked by the SCIM Client.</t>
  <t>Based on the RO and RA returned by the Server, there will be a HTTP POST, PUT, PATCH depending on the operation that the Client want to achieve.</t>
  <t>The Service Provider will return the RO/RA with additional metadata information to allow for audit.</t>
</list></t>

<t>The SCIM client on the left will map to the RC/RU and the Server in the middle will map into RM/RS, the SCIM client on the left is also sometimes called as the "HR Application", because it responsibilities are only on be the creator and updater of the RO and specific number of its RA, the client in this case has no responsibilities in doing any management of the Resources, typically done by an IdM. <br />
The center component as describe is the Server for the client on the left, will act as the Client for the server on the right, which typically is an SaaS application that want to consume RO and its RA from an RM.
In addition to the models seen before now the "HR Application" also subscribe to RA that are created by the RS and reported by the RM, the Application will be the creator of specific attributes.<br />
So we will see that the 3 SCIM elements will be RC/RU/RS for each RO/RA.</t>

</section>
</section>
<section anchor="client-active-pull"><name>Client Active Pull</name>
<t>This model of the trigger is created for those scenarios where there is no status database in the client, and where the Clients choose when and how often the pull the Server for RO/RA information, there are many consideration that can be taken based on the size of the object population the client is tracking, the frequency of the data change.
Client active pull could be use in situations where a client needs to maintain a synchronized large body of objects, such as a device list or user address book, but where there isn't any need to track individual RO/RA. 
Another use case would be a client that needs to have details of a specific device that was onboard by a mobile application and that need to provide the RO/RA information on the behalf of the device.</t>

<section anchor="resource-object-creation-or-update"><name>Resource Object Creation or Update</name>
<t>In this model we will have a Client that is going to pull information about a RO/RA from a Server. In this model the Client is going to management all the RO (Resource Objects) and its RA (Resource Attributes), that are provided by the Server, and the RM (Resource Management) function resides on the Client.</t>

<figure><artwork><![CDATA[
+----------+                                   +----------+
|          |                                   |          |
|          |                                   |          |
|          |                                   |          |
|          |                (1)                |   SCIM   |
|  Client  | --------------------------------> |  Server  |
|          |                                   |          |
|          |                (2)                |          |
|          | <-------------------------------- |          |   
|  RS/RM   |                                   |   RC/RU  |
|          |                                   |          |
|          |                                   |          |
+----------+                                   +----------+
        Figure 7:  SCIM  Flow and Orchestrator roles maps
]]></artwork></figure>

<t><list style="numbers">
  <t>The SCIM client will do an HTTP GET to obtain the RO/RA that will be available in the Server.</t>
  <t>The SCIM Server will return the RO/RA with additional metadata information to allow for audit.</t>
</list></t>

<t>A typical example of this use case is a device that is going to use a mobile application or browser base to enroll devices and gathers its attributes, that mobile application or browser after enrollment process is finish will do a trigger to notify the client that is ready to provide the RO/RA of the device. It is the SCIM client that will do al the Resource management for all the devices.</t>

</section>
<section anchor="resources-subscription"><name>Resources Subscription</name>
<t>In this model we will have the Client that is going to pull information about a RO/RA from the Server. In this model in the Client there is no status/change database, and it gets a list of all the RO/RA based on filters provided by the client, so there will be a full update every synchronization cycle.</t>

<figure><artwork><![CDATA[
+----------+                                   +----------+
|          |                                   |          |
|          |                                   |          |
|          |                                   |          |
|   SCIM   |                (1)                |          |
|  Server  | <-------------------------------- |  Client  |
|          |                                   |          |
|          |                (2)                |          |
|          | --------------------------------> |          |   
| RC/RU/RM |                                   |    RS    |
|          |                                   |          |
|          |                                   |          |
+----------+                                   +----------+
         Figure 8:  SCIM  Flow and Orchestrator roles maps
]]></artwork></figure>

<t><list style="numbers">
  <t>The SCIM client will do an HTTP GET to obtain the selected list of RO (Resource Object) and its RA (Resource Attributes).</t>
  <t>The SCIM Service Provider will return the RO and its RA with additional metadata information to allow for audit.</t>
</list></t>

<t>A good example would be SaaS service that needs to consume a list of contacts or devices, this SaaS service will need to know the relevant RO/RA, this operation will happen periodically and every time will get a full list of all the RO (Resource Objects).</t>

</section>
<section anchor="resource-object-creation-or-update-and-subscription"><name>Resource Object Creation or Update and Subscription</name>
<t>In this model we will bring together both of the two previous SCIM actions for pull information, where a typically a device can be the creator or their own attributes and will allow an SaaS service to subscribe to all the different RO/RA and deliver additional services for itself and other devices. It isn't expected from any of the SCIM clients in the Active pull model to create any status database of attributes changes, so the clients will always do a pull on one or many RO (Resource Objects) based on triggers.</t>

<figure><artwork><![CDATA[
+----------+                 +---------------+               +--------+
|          |                 |               |               |        |
|          |                 |               |               |        |
|          |                 |               |               |        |
|  SCIM    |       (1)       |Client         |      (3)      |        |
| Server   | <-------------- |           SCIM| <------------ | Client |
|          |                 |         Server|               |        | 
|          |       (2)       |               |      (4)      |        |
|          | --------------> |               | ------------> |        |
|          |                 |  RM/RS/RC/RU  |               |        |
|   RC/RU  |                 |               |               |   RS   |
|          |                 |               |               |        |
+----------+                 +---------------+               +--------+
                    Figure 9:  SCIM  Flow and Orchestrator roles maps
]]></artwork></figure>
<t><list style="numbers">
  <t>The SCIM client will do an HTTP GET to obtain the RO/RA that will be available in the Server.</t>
  <t>The SCIM Server will return the RO/RA with additional metadata information to allow for audit.</t>
  <t>The SCIM client will do an HTTP GET to obtain the selected list of RO (Resource Object) and its RA (Resource Attributes).</t>
  <t>The SCIM Service Provider will return the RO and its RA with additional metadata information to allow for audit.</t>
</list></t>

<t>A typical example of this use case is a device that is going to use a mobile application or browser base to enroll devices and gathers its attributes, that mobile application or browser after enrollment process is finish will do a trigger to notify the client that is ready to provide the RO/RA of the device. It is the SCIM client that will do all the Resource management for all the devices.<br />
This SCIM element in the center will also provide list list of contacts or devices, that can be consume by different SCIM entities, this operation will happen when a specific trigger will be execute by the client on the right, to get a list RO (Resource Objects) and RA (Resource Attributes) that will be defined by the filter on the client in the right.</t>

</section>
</section>
</section>
</section>
</section>
<section anchor="scim-use-cases"><name>SCIM Use Cases</name>
<t>This section we will describe the most common SCIM use cases, and will explain when, where, why and how we find them in the cross domain environment for resources managing. This list by no way tries to be exhaustive, the ultimate goal is to guide developers for the possibility of such models and will try to explain their challenges and components.
As mention before SCIM is a protocol for cross domains where two entities exchange information about resources, with the use cases we try to go further and explain on how the different components can interact to allow from simple to complex architectures for cross domain resource management, we will bring the orchestrators roles and will map them to the use cases to make more simple the task of explain the multiple functions of the SCIM elements.
Typically each use case add something on top of the previous one, starting in the most simple one, and finishing in the most complex ones. To make it easier the explanation, and to avoid repetitions of the same content we assume that what was describe in the previous use case applies to the use cases that come after, and something will be added on top.</t>

<section anchor="crud-operation-on-a-single-resource-associated-to-the-authz-action"><name>CRUD operation on a single resource, associated to the AuthZ action.</name>
<t>Get information about persona /me endpoint.<br />
A use case cover in [RFC7644] where a SCIM client can do CRUD operation on the entity of the user, in this use case the SCIM client that is the RM (Resource Manager), RC (Resource Creator) and RU (Resource Updater), will be able to read, create, update the RO (Resource Object) and its RA (Resource Attributes) in the RS (Resource Subscriber). the RS will provide an /me URI to achieve this.<br />
Special consideration needs to happen from authorization perspective, unlike the other CRUD use case bellow, the authorization for this use case only allows access to the RO (Resource Object) of the user that authenticate.</t>

</section>
<section anchor="idm-doing-crud-operations-on-saas-applications"><name>IdM doing CRUD operations on SaaS applications</name>
<t>Single RM/RC/RU and multiple RS.<br />
This is very common and simple SCIM use case, we have the IdM/Device Managers/etc. do all CRUD operation with the resources, then after the trigger mechanisms the resources information RO/RA reach the RS (Resource Subscribers), also know as the SaaS Application.<br />
The RS (Resource Subscriber) will take the decision on which RA (Resource Attributes) to consider and how the RO (Resource Object) will show in its resource database.<br />
Typically we will find this kind of use case in small to mid size organization, where there is no structure method to handle the resources and typically in Organization that start with a blank sheet of paper in a  greenfield deployment.</t>

</section>
<section anchor="idm-doing-crud-operations-on-saas-applications-and-objects-coming-from-external-non-scim-source"><name>IdM doing CRUD operations on SaaS applications, and Objects coming from external non SCIM source.</name>
<t>One or more ERC with single RM/RC/RU and multiple RS.<br />
This is another common use case, because it allow the organization to adopt SCIM protocol for CRUD operations of their resources. In this use case the organization already have an existent database of resources that is going to be the source of truth for the Resource Manager. <br />
Normally this ERC, specially if we are talking about user Identity, will have a User database that can be accessible using LDAP, some times the ERC can provide RO/RA using SAML Single Sign-On using Just in time Provision. We also see some IDaaS providing softwares that allow them to exchange resource information by using proprietary protocols, very common using HTTP REST to get the information from the ERC to the RM.<br />
Typically in this use case the RM will become the new source of truth for the resources of our Organization, will add extra RA (Resource Attributes) and ignore other RA that existed in the ERC.<br />
Some organization that already realize that going forward in the SCIM path, the RM will be the authority answer for the RO/RA, will start create new RO in the RM.<br />
The Resource Subscribers will consume all or a subset of the RO/RA from the RM.<br />
Typically we will see this use case in small to mid size organization where resources were organized in a non standardize platform for Resources Management, where it isn't possible to cut/replace everything with a new system.</t>

</section>
<section anchor="idm-doing-crud-operations-on-saas-applications-and-objects-coming-from-external-scim-source"><name>IdM doing CRUD operations on SaaS applications, and Objects coming from external SCIM source.</name>
<t>One or more RC/RU, with single RM/RC/RU/RS and multiple RS.<br />
In this use case, the the CRUD operation for the RO (Resource Object) and its RA (Resource Attributes) does not belong to the RM (Resource Manager), this is done in a separate SCIM entity, the Resource Creator/Resource Updater. <br />
A good example of this is use case are Organization that have their HR application, and the lifecycle of the resource (typically groups and Users) is done by that application.<br />
We could also have devices where the creation and update operations are always done by the device  itself or by a mobile application/web server on their behalf, in this use case the roles of RC/RU moves away from the RM.
We could also have this use case where the RM is extended with the Roles of RC/RU for extra RA (Resources Attributes) that are not authoritative by the "HR System"/device, but normally that bring more complexity to the authority models for the CRUD operation of the resources.  <br />
Typically we will see this use case in mid to large organization where no structure method to handle the resources start with a blank sheet of paper in a  greenfield deployment.</t>

</section>
<section anchor="idm-doing-crud-operations-on-saas-applications-and-objects-coming-from-external-scim-and-non-scim-source-including-the-idm-itself"><name>IdM doing CRUD operations on SaaS applications, and Objects coming from external SCIM and non SCIM source including the IDM itself.</name>
<t>One or more ERC, one or more RC/RU, with single RM/RC/RU/RS and multiple RS.<br />
In this use case, one of the source of the Resource information is in a ERC (External Resource Creator), or in the entity that has the role of RC/RU (example given before the HR System), some times the HR system can also consumes information from the ERC, and complement it. 
This doesn't mean that the RM will not  need to consolidate RO/RA from the SCIM and non SCIM entities and consolidate and aggregate RO/RAs for those multiple sources. The RM gets its authoritative Information from both systems the RC/RU and from the ERC, and need to define rules which ones to take and to ignore.
In this model there need to be careful thoughts so that we avoid loops where specific RO/RA.<br />
Typically we will see this use case in mid to large organization where resources were organized in a non standardize platform for Resources Management, where it isn't possible to cut/replace everything with a new system.</t>

</section>
<section anchor="idm-doing-crud-operations-on-saas-applications-and-objects-coming-from-external-scim-and-non-scim-source-including-the-idm-itself-where-some-resource-attributes-come-from-saas-application"><name>IdM doing CRUD operations on SaaS applications, and Objects coming from external SCIM and non SCIM source including the IDM itself, where some Resource Attributes come from SaaS application.</name>
<t>One or more ERC, one or more RC/RU, with single RM/RC/RU/RS and multiple RS/RU.<br />
In this use case we add the capability of the Resource Subscriber to be also an Resource Update, it is very common that an SaaS application can be the source of truth for specifics RA and add extra details to the RO.<br />
Typically we will see this use case in large organization where resources were organized in a non standardize platform for Resources Management and it isn't possible to cut/replace everything with a new system. Those organization start to adopt many application that brings new attributes to the different resources that already exist in the system.</t>

</section>
<section anchor="idm-doing-crud-operations-on-saas-applications-and-objects-coming-from-external-scim-and-non-scim-sources-including-the-idm-itself-where-some-resource-attributes-come-from-saas-application-and-are-updated-in-the-scim-object-creator"><name>IdM doing CRUD operations on SaaS applications, and Objects coming from external SCIM and non SCIM sources including the IdM itself, where some Resource Attributes come from SaaS application, and are updated in the SCIM object creator.</name>
<t>One or more ERC, one or more RC/RU/RS, with single RM/RC/RU/RS and multiple RS/RU.<br />
In this use case we introduce the possibility of the RC/RU (example given before the HR System) be interested in the attribute that was created updated by the RS/RU (also known as the SaaS application), an example could be adding the business email that was created by the mail service (that came from RS/RU) to the HR information service (the RC/RU/RS element).<br />
Typically we will see this use case in large organization where resources were organized in a non standardize platform for Resources Management and it isn't possible to cut/replace everything with a new system. Those organization start to adopt many application that brings attributes to the different resources that already exist in the system, but they need to have all the important attributes of Resources in a application in our examples "HR application".</t>

</section>
<section anchor="multiple-idm-doing-crud-operations-on-saas-applications-and-objects-coming-from-external-scim-and-non-scim-sources-including-the-idm-itself-where-some-resource-attributes-come-from-saas-application-and-are-updated-in-the-scim-object-creator"><name>Multiple IdM doing CRUD operations on SaaS applications, and Objects coming from external SCIM and non SCIM sources including the IdM itself, where some Resource Attributes come from SaaS application, and are updated in the SCIM object creator.</name>
<t>One or more ERC, one or more RC/RU/RS, with one or more RM/RC/RU/RS and multiple RS/RU.<br />
In this use case we introduce the possibility of having multiple Resource Managers, where the information from the RO/RA is consolidated across different domains/services.<br />
As in the previous 3 uses cases we need to have careful thoughts so that we avoid loops where specific Resource Attributes write over and over again by the ERC and RC/RU, having now extra consideration for the fact that now we can have multiple Resource Managers.<br />
Typically we will see this use case in large organization, or between organization that have their own business to business communication and have the need for exchange information about Resources. Many other good example can be provided like organizations that by merging or acquisition, arrive to a situation where multiple RM exist, and their IT departments have to merge Resource information.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>
<t>Authentication and authorization must be guaranteed for the SCIM operations to ensure that only authenticated entities can perform the SCIM requests and the requested SCIM operations are authorized. 
SCIM resources (e.g., Users and Groups) can contain sensitive information.  Thus, data confidentiality MUST be guaranteed at the transport layer.
There can be privacy issues that go beyond transport security, e.g., moving personally identifying information (PII) offshore between different SCIM elements.
Regulatory requirements shall be met when migrating identity information between jurisdictional regions (e.g., countries and states may have differing regulations on privacy).
Additionally, privacy-sensitive data elements may be omitted or obscured in SCIM transactions or stored records to protect these data elements for a user. For instance, a role-based identifier might be used in place of an individual's name.
Detailed security considerations are specified in Section 7 of the SCIM protocol [RFC7644] and Section 9 of the SCIM schema [RFC7643].</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

</section>
<section anchor="references"><name>References</name>

<section anchor="normative-references"><name>Normative References</name>
<t>[RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
   Requirement Levels", BCP 14, RFC 2119,
   DOI 10.17487/RFC2119, March 1997,
   <eref target="http://www.rfc-editor.org/info/rfc2119">http://www.rfc-editor.org/info/rfc2119</eref>.</t>

</section>
<section anchor="informative-references"><name>Informative References</name>
<t>[RFC7643]  Hunt, P., Ed., Grizzle, K., Wahlstroem, E., and
   C. Mortimore, "System for Cross-domain Identity
   Management: Core Schema", RFC 7643, DOI 10.17487/RFC7643,
   September 2015, <eref target="http://www.rfc-editor.org/info/rfc7643">http://www.rfc-editor.org/info/rfc7643</eref>.</t>

<t>[RFC7644]  Hunt, P., Ed., Grizzle, K., Ansari, M., Wahlstroem, E.,
   and C. Mortimore, "System for Cross-domain Identity
   Management: Protocol", RFC 7644, DOI 10.17487/RFC7644,
   September 2015, <eref target="http://www.rfc-editor.org/info/rfc7644">http://www.rfc-editor.org/info/rfc7644</eref>.</t>

<t>[RFC7642] K. LI, P. Hunt, B. Khasnabish, A. Nadalin and Z. Zeltsan,
   "System for Cross-domain Identity Management: Definitions, Overview, Concepts, and Requirements", 
   RFC 7642, September 2015, <eref target="http://www.rfc-editor.org/info/rfc7642">http://www.rfc-editor.org/info/rfc7642</eref>.</t>

<t>[Device Schema Extensions to the SCIM model] M. Shahzad, H. Iqbal and E. Lear
   July 2023, <eref target="https://datatracker.ietf.org/doc/draft-shahzad-scim-device-model">https://datatracker.ietf.org/doc/draft-shahzad-scim-device-model</eref>.</t>

<t>[SCIM Profile for Security Event Tokens] P. Hunt, N. Cam-Winget and M. Kiser
   July 2023, <eref target="https://datatracker.ietf.org/doc/draft-ietf-scim-events">https://datatracker.ietf.org/doc/draft-ietf-scim-events</eref>.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

</section>
</section>


  </middle>

  <back>






  </back>

<!-- ##markdown-source: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-->

</rfc>

