
From nobody Fri Jul 20 06:56:42 2018
Return-Path: <matthew.a.randall@gmail.com>
X-Original-To: scim@ietfa.amsl.com
Delivered-To: scim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39EA3131168 for <scim@ietfa.amsl.com>; Fri, 20 Jul 2018 06:56:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pQPfnc-t-91M for <scim@ietfa.amsl.com>; Fri, 20 Jul 2018 06:56:38 -0700 (PDT)
Received: from mail-wm0-x235.google.com (mail-wm0-x235.google.com [IPv6:2a00:1450:400c:c09::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0DCEF1310E1 for <scim@ietf.org>; Fri, 20 Jul 2018 06:56:38 -0700 (PDT)
Received: by mail-wm0-x235.google.com with SMTP id s14-v6so9954972wmc.1 for <scim@ietf.org>; Fri, 20 Jul 2018 06:56:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=d8wELqJEyzlnj/8HDNUgMtImMjaApQwmSGc1nRHFJcA=; b=HOqvgAOzuP6VtNQYpWlcdqczaIBzbXsR0Wb32fbjw/MIGeLxtrVvboUdwbRxhXM7AW 07JzhznAfUY4EaQAqwHQUfLRPwUjgmiVHYe8MsPpnnHOG7ZQQuSj5jozdTmdTF0CntI2 qltSbmqfNgEkCRLwJTWN++OnVDkHcSNl60yh/ECKTYU66kgq9XLjhwy7qA43bgZ6PAcA 7PnIMo6MO4BtfYzvXYZPDpziGBt0x4VsMSyT3AgI6SCaTjrdw0PEoRIuuRjp6z5t6Yqx xtJBiEash1PntKnQgjNYvqGDrvSENt2Gg2GEw+gTy7YfYeZBRJaWJ/1pZIv93P83mDVk BgDA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=d8wELqJEyzlnj/8HDNUgMtImMjaApQwmSGc1nRHFJcA=; b=S9zHkxdu9PIi9Rvb4SAyeqSiOLoc1rIDQ6lMw5pW3dmfIbpMgaDktoAGxov9054H24 kQ1UGybYG8WyTKvvfM9OjDeJQpDAxjGjYGvpfYgoroeo/8S/yDy4Av3gn5VrLGFhx1Dw lMEUWQo7kTTIG/ibVe9l0vHVIOD8WNPwpp5MeV8sb4siqMIzh/0fb5BFUSB9vGa4vDBG Vnk85/3JqeRitaxBCBrVnEjs33gG+2HUV7k3a2bOXQGSR4VLKXSWFrJplqHLt4oz/eUY PjPeuVQl4f91GN2LOmbh/0X3cFh376E5GYue8rIjPeWM0Pe55aOWbs4Si0F2cSe93RbX rYOQ==
X-Gm-Message-State: AOUpUlHZKn2M0J0x5XrcdDrN8s3Mo1YEIzXU/keVVTXXcJ+2Qx6+wyBd Z0vOk/Sd1lRKab5w+Kw5Ab7+epEhjTq7Q7EeqVl8UA==
X-Google-Smtp-Source: AAOMgpcefcAskcWAE57G/d3yVGmuEWzZ5UsP2rFyyDo42HARKiCPBHFLDObFotx7Dn4gt520/htdQSUuUrDxWJckZRo=
X-Received: by 2002:a1c:8010:: with SMTP id b16-v6mr1714637wmd.41.1532094996249;  Fri, 20 Jul 2018 06:56:36 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:adf:d105:0:0:0:0:0 with HTTP; Fri, 20 Jul 2018 06:56:35 -0700 (PDT)
From: Matt Randall <matthew.a.randall@gmail.com>
Date: Fri, 20 Jul 2018 08:56:35 -0500
Message-ID: <CANDH0ytSNbA0ak4mBpvkgEVseeR=PP739Ms0F58-Q60xL3BWsw@mail.gmail.com>
To: scim@ietf.org
Content-Type: multipart/alternative; boundary="0000000000000380fe05716eaa50"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scim/xULLvrxaZsGsaAZ9Q4Chin_hnLg>
Subject: [scim] Storing "federated" user identifiers using SCIM
X-BeenThere: scim@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Simple Cloud Identity Management BOF <scim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scim>, <mailto:scim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scim/>
List-Post: <mailto:scim@ietf.org>
List-Help: <mailto:scim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scim>, <mailto:scim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 13:56:40 -0000

--0000000000000380fe05716eaa50
Content-Type: text/plain; charset="UTF-8"

Our company has an interesting use case - I was curious if any members of
the group had encountered it when developing their own SaaS platform, if
there were perhaps an existing schema / schema attribute that I had
overlooked, or if there is some sort of existing convention for the
following use case?

For our SaaS platform, we want to enable our customers to push users to our
platform and enable those users to log in with a potential multiplicity of
identity providers (1:M relationship between a user and their individual
identities at different identity provider(s)).  This would require the
storage of both the "issuer" (SAML entity ID, OIDC Issuer) and principal
(and, in the case of SAML, potentially the NameID type.)

I'd imagine this type of data would be modeled as a multi-valued attribute
of user whose values are complex attributes, containing the 2-3
prerequisite data points mentioned above.

To date, we had always aligned SCIM as a 1:1 feed with an identity
provider, requiring the IdP's asserted principal to match the SCIM
username.  We're encountering scenarios where it would be useful for
customers to have a single feed where users use potentially different
identity providers, and where a single user might be serviced by
multiples.  Does anyone else share our use case in this community, or
perhaps encountered an existing pattern for this?

Thank you,

- Matt Randall

--0000000000000380fe05716eaa50
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Our company has an interesting use case - I was curio=
us if any members of the group had encountered it when developing their own=
 SaaS platform, if there were perhaps an existing schema / schema attribute=
 that I had overlooked, or if there is some sort of existing convention for=
 the following use case?<br></div><div><br></div><div>For our SaaS platform=
, we want to enable our customers to push users to our platform and enable =
those users to log in with a potential multiplicity of identity providers (=
1:M relationship between a user and their individual identities at differen=
t identity provider(s)).=C2=A0 This would require the storage of both the &=
quot;issuer&quot; (SAML entity ID, OIDC Issuer) and principal (and, in the =
case of SAML, potentially the NameID type.)</div><div><br></div><div>I&#39;=
d imagine this type of data would be modeled as a multi-valued attribute of=
 user whose values are complex attributes, containing the 2-3 prerequisite =
data points mentioned above.</div><div><br></div><div>To date, we had alway=
s aligned SCIM as a 1:1 feed with an identity provider, requiring the IdP&#=
39;s asserted principal to match the SCIM username.=C2=A0 We&#39;re encount=
ering scenarios where it would be useful for customers to have a single fee=
d where users use potentially different identity providers, and where a sin=
gle user might be serviced by multiples.=C2=A0 Does anyone else share our u=
se case in this community, or perhaps encountered an existing pattern for t=
his?</div><div><br></div><div>Thank you,</div><div><br></div><div>- Matt Ra=
ndall<br></div><div><br></div></div>

--0000000000000380fe05716eaa50--


From nobody Fri Jul 20 09:01:03 2018
Return-Path: <phil.hunt@oracle.com>
X-Original-To: scim@ietfa.amsl.com
Delivered-To: scim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5AD0F129385 for <scim@ietfa.amsl.com>; Fri, 20 Jul 2018 09:01:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.309
X-Spam-Level: 
X-Spam-Status: No, score=-4.309 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NXaETNSxj-AK for <scim@ietfa.amsl.com>; Fri, 20 Jul 2018 09:00:55 -0700 (PDT)
Received: from aserp2120.oracle.com (aserp2120.oracle.com [141.146.126.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BB56B130FDB for <scim@ietf.org>; Fri, 20 Jul 2018 09:00:55 -0700 (PDT)
Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w6KFwu3J001717; Fri, 20 Jul 2018 16:00:53 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=corp-2018-07-02; bh=xupEmxbE5w1s+00X7bRvE4B9OCZ19RVjNLaYB0Xw7eY=; b=aZTZmcuCOXgfEpY1QnzIRQroMGrDGbekHfZomv3oqpjsHMIpVa0RZve7kjOMzP9IPlv3 LHBiY06qv0mvjiYw+nQhZdUjUXM29K1kdUBNLHnsxy/ZyE0PS9V1XaITO3zkEkBSHZxG bmL1I+UA9qLiPB4DmoUsdra+jv59/37tkSL6bbXhA8nVy3zjtq2fCFiyfP+FHkhFR+gR 0Jx124KlcHFqfWbB0JpC9PAp9X9/Y/yubrf08JxbaZ2yeDF5fUP85XJeGDJe4+LtZsni bMnn5MlHZNXGK3eToOLJGLLSZNnQLF1Gispxvnqt5dZw4ZAYK27BfrcO0HLacWDn0nNd lA== 
Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by aserp2120.oracle.com with ESMTP id 2k9yjguv97-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 20 Jul 2018 16:00:52 +0000
Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w6KG0pZo009472 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 20 Jul 2018 16:00:52 GMT
Received: from abhmp0003.oracle.com (abhmp0003.oracle.com [141.146.116.9]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w6KG0p5Q031776; Fri, 20 Jul 2018 16:00:51 GMT
Received: from [10.0.1.37] (/24.86.190.97) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 20 Jul 2018 09:00:51 -0700
From: Phil Hunt <phil.hunt@oracle.com>
Message-Id: <EAF81B94-1EF2-403C-AAB4-DA59A561D7BF@oracle.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_DAD0B047-015B-4CC5-BC29-08525D828415"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Fri, 20 Jul 2018 09:00:48 -0700
In-Reply-To: <CANDH0ytSNbA0ak4mBpvkgEVseeR=PP739Ms0F58-Q60xL3BWsw@mail.gmail.com>
Cc: scim@ietf.org
To: Matt Randall <matthew.a.randall@gmail.com>
References: <CANDH0ytSNbA0ak4mBpvkgEVseeR=PP739Ms0F58-Q60xL3BWsw@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8959 signatures=668706
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1807200178
Archived-At: <https://mailarchive.ietf.org/arch/msg/scim/mrr4S7vdfLM59VYKUqsLGxaWrKo>
Subject: Re: [scim] Storing "federated" user identifiers using SCIM
X-BeenThere: scim@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Simple Cloud Identity Management BOF <scim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scim>, <mailto:scim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scim/>
List-Post: <mailto:scim@ietf.org>
List-Help: <mailto:scim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scim>, <mailto:scim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 16:01:02 -0000

--Apple-Mail=_DAD0B047-015B-4CC5-BC29-08525D828415
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Matt,

I think this is an interesting question. It may be that a new claim =
should be defined for tracking identifier relationships with IDPs when =
users associate more than one IDP.

It goes beyond classic federation and also includes implicit federation =
through things like email and telephone numbers.

For example, a telephone number used as a verification channel (e.g. =
sms) vs. telephone number for phone calls is different.

IMO, the phone attribute in SCIM should not be used for this purpose.

So here is the issue. While such a spec might be useful to tell people =
how they might do this, is it important from an inter-op perspective =
that people migrate to a common way of doing it?

Phil

Oracle Corporation, Identity Cloud Services Architect
@independentid
www.independentid.com =
<http://www.independentid.com/>phil.hunt@oracle.com =
<mailto:phil.hunt@oracle.com>

> On Jul 20, 2018, at 6:56 AM, Matt Randall =
<matthew.a.randall@gmail.com> wrote:
>=20
> Our company has an interesting use case - I was curious if any members =
of the group had encountered it when developing their own SaaS platform, =
if there were perhaps an existing schema / schema attribute that I had =
overlooked, or if there is some sort of existing convention for the =
following use case?
>=20
> For our SaaS platform, we want to enable our customers to push users =
to our platform and enable those users to log in with a potential =
multiplicity of identity providers (1:M relationship between a user and =
their individual identities at different identity provider(s)).  This =
would require the storage of both the "issuer" (SAML entity ID, OIDC =
Issuer) and principal (and, in the case of SAML, potentially the NameID =
type.)
>=20
> I'd imagine this type of data would be modeled as a multi-valued =
attribute of user whose values are complex attributes, containing the =
2-3 prerequisite data points mentioned above.
>=20
> To date, we had always aligned SCIM as a 1:1 feed with an identity =
provider, requiring the IdP's asserted principal to match the SCIM =
username.  We're encountering scenarios where it would be useful for =
customers to have a single feed where users use potentially different =
identity providers, and where a single user might be serviced by =
multiples.  Does anyone else share our use case in this community, or =
perhaps encountered an existing pattern for this?
>=20
> Thank you,
>=20
> - Matt Randall
>=20
> _______________________________________________
> scim mailing list
> scim@ietf.org
> =
https://urldefense.proofpoint.com/v2/url?u=3Dhttps-3A__www.ietf.org_mailma=
n_listinfo_scim&d=3DDwICAg&c=3DRoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE=
&r=3Dna5FVzBTWmanqWNy4DpctyXPpuYqPkAI1aLcLN4KZNA&m=3D4huGrUWTzM7INaDfFAyjd=
X5Zuv-IroMCn7fvjCf-S6k&s=3DR8YOT-RYy6UdMSYBx62oRmMBpzTpv_qJOLpZXoeiuSM&e=3D=



--Apple-Mail=_DAD0B047-015B-4CC5-BC29-08525D828415
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">Matt,</div><div class=3D""><br class=3D""></div>I think this =
is an interesting question. It may be that a new claim should be defined =
for tracking identifier relationships with IDPs when users associate =
more than one IDP.<div class=3D""><br class=3D""></div><div class=3D"">It =
goes beyond classic federation and also includes implicit federation =
through things like email and telephone numbers.</div><div class=3D""><div=
 class=3D""><br class=3D""></div><div class=3D"">For example, a =
telephone number used as a verification channel (e.g. sms) vs. telephone =
number for phone calls is different.</div><div class=3D""><br =
class=3D""></div><div class=3D"">IMO, the phone attribute in SCIM should =
not be used for this purpose.</div><div class=3D""><br =
class=3D""></div><div class=3D"">So here is the issue. While such a spec =
might be useful to tell people how they might do this, is it important =
from an inter-op perspective that people migrate to a common way of =
doing it?</div><div class=3D""><br class=3D""></div><div =
class=3D"">Phil</div><div class=3D""><div class=3D""><div style=3D"color: =
rgb(0, 0, 0); letter-spacing: normal; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;" class=3D""><div style=3D"color: rgb(0, 0, 0); =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;" class=3D""><div style=3D"color: rgb(0, 0, 0); =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;" class=3D""><div style=3D"color: rgb(0, 0, 0); =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;" class=3D""><div style=3D"color: rgb(0, 0, 0); =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;" class=3D""><div style=3D"color: rgb(0, 0, 0); =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;" class=3D""><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; line-height: normal; border-spacing: =
0px;"><div class=3D"" style=3D"word-wrap: break-word; -webkit-nbsp-mode: =
space; -webkit-line-break: after-white-space;"><div class=3D""><div =
class=3D""><div class=3D""><br class=3D""></div><div class=3D"">Oracle =
Corporation, Identity Cloud Services Architect</div><div =
class=3D"">@independentid</div><div class=3D""><a =
href=3D"http://www.independentid.com" =
class=3D"">www.independentid.com</a></div></div></div></div></span><a =
href=3D"mailto:phil.hunt@oracle.com" class=3D"" style=3D"orphans: 2; =
widows: =
2;">phil.hunt@oracle.com</a></div></div></div></div></div></div></div></di=
v></div></div></div></div>
</div>
<div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Jul 20, 2018, at 6:56 AM, Matt Randall &lt;<a =
href=3D"mailto:matthew.a.randall@gmail.com" =
class=3D"">matthew.a.randall@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div dir=3D"ltr" =
class=3D""><div class=3D"">Our company has an interesting use case - I =
was curious if any members of the group had encountered it when =
developing their own SaaS platform, if there were perhaps an existing =
schema / schema attribute that I had overlooked, or if there is some =
sort of existing convention for the following use case?<br =
class=3D""></div><div class=3D""><br class=3D""></div><div class=3D"">For =
our SaaS platform, we want to enable our customers to push users to our =
platform and enable those users to log in with a potential multiplicity =
of identity providers (1:M relationship between a user and their =
individual identities at different identity provider(s)).&nbsp; This =
would require the storage of both the "issuer" (SAML entity ID, OIDC =
Issuer) and principal (and, in the case of SAML, potentially the NameID =
type.)</div><div class=3D""><br class=3D""></div><div class=3D"">I'd =
imagine this type of data would be modeled as a multi-valued attribute =
of user whose values are complex attributes, containing the 2-3 =
prerequisite data points mentioned above.</div><div class=3D""><br =
class=3D""></div><div class=3D"">To date, we had always aligned SCIM as =
a 1:1 feed with an identity provider, requiring the IdP's asserted =
principal to match the SCIM username.&nbsp; We're encountering scenarios =
where it would be useful for customers to have a single feed where users =
use potentially different identity providers, and where a single user =
might be serviced by multiples.&nbsp; Does anyone else share our use =
case in this community, or perhaps encountered an existing pattern for =
this?</div><div class=3D""><br class=3D""></div><div class=3D"">Thank =
you,</div><div class=3D""><br class=3D""></div><div class=3D"">- Matt =
Randall<br class=3D""></div><div class=3D""><br class=3D""></div></div>
_______________________________________________<br class=3D"">scim =
mailing list<br class=3D""><a href=3D"mailto:scim@ietf.org" =
class=3D"">scim@ietf.org</a><br =
class=3D"">https://urldefense.proofpoint.com/v2/url?u=3Dhttps-3A__www.ietf=
.org_mailman_listinfo_scim&amp;d=3DDwICAg&amp;c=3DRoP1YumCXCgaWHvlZYR8PZh8=
Bv7qIrMUB65eapI_JnE&amp;r=3Dna5FVzBTWmanqWNy4DpctyXPpuYqPkAI1aLcLN4KZNA&am=
p;m=3D4huGrUWTzM7INaDfFAyjdX5Zuv-IroMCn7fvjCf-S6k&amp;s=3DR8YOT-RYy6UdMSYB=
x62oRmMBpzTpv_qJOLpZXoeiuSM&amp;e=3D<br =
class=3D""></div></blockquote></div><br =
class=3D""></div></div></body></html>=

--Apple-Mail=_DAD0B047-015B-4CC5-BC29-08525D828415--

