{"id":277,"date":"2015-09-14T20:22:42","date_gmt":"2015-09-14T20:22:42","guid":{"rendered":"https:\/\/www.securekloud.com\/blog\/?p=277"},"modified":"2025-07-28T07:19:45","modified_gmt":"2025-07-28T07:19:45","slug":"managing-user-identity-across-cloud-based-application-with-scim","status":"publish","type":"post","link":"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/","title":{"rendered":"How to Optimize\u00a0User Identity\u00a0In\u00a0Cloud Applications\u00a0with SCIM"},"content":{"rendered":"<p>Simple Cloud Identity Management (SCIM) Protocol is a standard-based provisioning and de-provisioning user identity to the cloud-based SaaS applications. SCIM\u2019s pragmatic approach it is designed quick and easy to move the user identity across the cloud applications. It\u2019s mainly intent is to reduce the cost and complexity of user management operations by providing a common user schema and extension model, as well as binding documents to provide patterns for exchanging this schema using standard protocols.<\/p>\n<p>SCIM is built on a model where a resource is the common denominator and all SCIM objects are derived from it. SCIM has three objects that directly derives from the Resource object. The ServiceProviderConfiguration and Schema are used to discover the service provider configuration. The Core Resource object specifies the endpoint resources User, Group and Organization.<\/p>\n<p>The SCIM protocol exchange the user identities between two applications over HTTP protocol using REST (Representational State Transfer) protocol. SCIM protocol exposes a common user schema and resource object expressed JSON format and XML format. SCIM requests are made via HTTP requests with different HTTP methods and responses are returned in the body of the HTTP response, formatted as JSON or XML depending on the request.<\/p>\n<p>Following are the SCIM Endpoint services for standard-based user identity provisioning and de-provisioning across cloud-based applications.<\/p>\n<p># SCIM provides two end point to discover supported features and specific attribute details.<\/p>\n<p>\u2022 GET \/ServiceProviderConfigs \u2013 This endpoint specify the service provider<\/p>\n<p>specification and compliance, authentication schemes and data models.<\/p>\n<p>\u2022 GET \/Schemas \u2013 This endpoint specify the service provider\u2019s resources and attribute extensions.<\/p>\n<p># SCIM Provides a REST API with simple set of HTTP\/HTTPS (For CRUD) operations.<\/p>\n<p>\u2022 POST \u2013 https:\/\/endpoint.com\/{v}\/{resource} \u2013 Create a new resource or Bulk resource.<\/p>\n<p>\u2022 GET \u2013 https:\/\/endpoint.com\/{v}\/{resource}\/{id} \u2013 Retrieves a particular resource.<\/p>\n<p>\u2022 GET \u2013 https:\/\/endpoint.com\/{v}\/{resource}?\ufb01lter={attribute}{op}{value}&amp;<\/p>\n<p>sortBy={attributeName}&amp;sortOrder={ascending|descending} \u2013 Retrieves a resource with filter parameters.<\/p>\n<p>\u2022 PUT \u2013 https:\/\/endpoint.com\/{v}\/{resource}\/{id} \u2013 Modifies a resource with a<\/p>\n<p>complete, consumer specified resource (Replace the full resource).<\/p>\n<p>\u2022 PATCH \u2013 https:\/\/endpoint.com\/{v}\/{resource}\/{id} \u2013 Modifies a resource with a set of<\/p>\n<p>consumer specified changes (Update particular resource).<\/p>\n<p>\u2022 DELETE \u2013 https:\/\/endpoint.com\/{v}\/{resource}\/{id} \u2013 Deletes a resource. (Delete particular resource)<\/p>\n<p>How SCIM protocol to provision the user identities into the Cloud (SaaS) application.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-278 size-full\" src=\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/SCIM.png\" alt=\"\" width=\"941\" height=\"736\" srcset=\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/SCIM.png 941w, https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/SCIM-300x235.png 300w, https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/SCIM-768x601.png 768w, https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/SCIM-600x469.png 600w\" sizes=\"(max-width: 941px) 100vw, 941px\" \/><\/p>\n<p>The SCIM protocol does not define a scheme for authentication and authorization therefore Service Provider are free to choose mechanisms appropriate to their use cases. Most of the SaaS applications (Service provider) provide OAuth2.0 security protocol for authentication and authorization, some of the SaaS application provide their own authentication mechanism. However now days most of the IDM vendors (CA, SailPoint, PingIdentity.) support SCIM protocol.<\/p>\n<p>If you need more information about on this SCIM protocol refer this link&nbsp;<a href=\"http:\/\/www.simplecloud.info\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.simplecloud.info\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Simple Cloud Identity Management (SCIM) Protocol is a standard-based provisioning and de-provisioning user identity to the cloud-based SaaS applications. SCIM\u2019s pragmatic approach it is designed quick and easy to move the user identity across the cloud applications. It\u2019s mainly intent is to reduce the cost and complexity of user management operations by providing a common [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":281,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[40],"tags":[],"class_list":["post-277","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-access-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Manage User Identity Across Cloud Apps Securely with SCIM<\/title>\n<meta name=\"description\" content=\"Learn how SCIM simplifies cloud-based user identity management by automating provisioning, reducing errors, and enhancing access control across apps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Manage User Identity Across Cloud Apps Securely with SCIM\" \/>\n<meta property=\"og:description\" content=\"Learn how SCIM simplifies cloud-based user identity management by automating provisioning, reducing errors, and enhancing access control across apps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/\" \/>\n<meta property=\"og:site_name\" content=\"SecureKloud\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-14T20:22:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-28T07:19:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2015\/09\/managing-user-identity-across-cloud-based-application-with-scim_v1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Joe Arputhan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joe Arputhan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/\"},\"author\":{\"name\":\"Joe Arputhan\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/de22247532aa8172abce3df9a1b12708\"},\"headline\":\"How to Optimize\u00a0User Identity\u00a0In\u00a0Cloud Applications\u00a0with SCIM\",\"datePublished\":\"2015-09-14T20:22:42+00:00\",\"dateModified\":\"2025-07-28T07:19:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/\"},\"wordCount\":476,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\"},\"articleSection\":[\"Identity Access Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/\",\"name\":\"Manage User Identity Across Cloud Apps Securely with SCIM\",\"isPartOf\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#website\"},\"datePublished\":\"2015-09-14T20:22:42+00:00\",\"dateModified\":\"2025-07-28T07:19:45+00:00\",\"description\":\"Learn how SCIM simplifies cloud-based user identity management by automating provisioning, reducing errors, and enhancing access control across apps.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.securekloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Optimize\u00a0User Identity\u00a0In\u00a0Cloud Applications\u00a0with SCIM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#website\",\"url\":\"https:\/\/www.securekloud.com\/blog\/\",\"name\":\"SecureKloud\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.securekloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\",\"name\":\"SecureKloud\",\"url\":\"https:\/\/www.securekloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png\",\"contentUrl\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png\",\"width\":240,\"height\":48,\"caption\":\"SecureKloud\"},\"image\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/de22247532aa8172abce3df9a1b12708\",\"name\":\"Joe Arputhan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/joe-arputhan-150x150.jpg\",\"contentUrl\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/joe-arputhan-150x150.jpg\",\"caption\":\"Joe Arputhan\"},\"description\":\"Writer, researcher, content marketing evangelist, cloud and blockchain enthusiast.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/joe-arputhan-68b90523\/\"],\"url\":\"https:\/\/www.securekloud.com\/blog\/author\/joe-arputhan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Manage User Identity Across Cloud Apps Securely with SCIM","description":"Learn how SCIM simplifies cloud-based user identity management by automating provisioning, reducing errors, and enhancing access control across apps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/","og_locale":"en_US","og_type":"article","og_title":"Manage User Identity Across Cloud Apps Securely with SCIM","og_description":"Learn how SCIM simplifies cloud-based user identity management by automating provisioning, reducing errors, and enhancing access control across apps.","og_url":"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/","og_site_name":"SecureKloud","article_published_time":"2015-09-14T20:22:42+00:00","article_modified_time":"2025-07-28T07:19:45+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2015\/09\/managing-user-identity-across-cloud-based-application-with-scim_v1.jpg","type":"image\/jpeg"}],"author":"Joe Arputhan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Joe Arputhan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/#article","isPartOf":{"@id":"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/"},"author":{"name":"Joe Arputhan","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/de22247532aa8172abce3df9a1b12708"},"headline":"How to Optimize\u00a0User Identity\u00a0In\u00a0Cloud Applications\u00a0with SCIM","datePublished":"2015-09-14T20:22:42+00:00","dateModified":"2025-07-28T07:19:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/"},"wordCount":476,"commentCount":0,"publisher":{"@id":"https:\/\/www.securekloud.com\/blog\/#organization"},"articleSection":["Identity Access Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/","url":"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/","name":"Manage User Identity Across Cloud Apps Securely with SCIM","isPartOf":{"@id":"https:\/\/www.securekloud.com\/blog\/#website"},"datePublished":"2015-09-14T20:22:42+00:00","dateModified":"2025-07-28T07:19:45+00:00","description":"Learn how SCIM simplifies cloud-based user identity management by automating provisioning, reducing errors, and enhancing access control across apps.","breadcrumb":{"@id":"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.securekloud.com\/blog\/managing-user-identity-across-cloud-based-application-with-scim\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.securekloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Optimize\u00a0User Identity\u00a0In\u00a0Cloud Applications\u00a0with SCIM"}]},{"@type":"WebSite","@id":"https:\/\/www.securekloud.com\/blog\/#website","url":"https:\/\/www.securekloud.com\/blog\/","name":"SecureKloud","description":"","publisher":{"@id":"https:\/\/www.securekloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.securekloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.securekloud.com\/blog\/#organization","name":"SecureKloud","url":"https:\/\/www.securekloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png","contentUrl":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png","width":240,"height":48,"caption":"SecureKloud"},"image":{"@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/de22247532aa8172abce3df9a1b12708","name":"Joe Arputhan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/joe-arputhan-150x150.jpg","contentUrl":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/joe-arputhan-150x150.jpg","caption":"Joe Arputhan"},"description":"Writer, researcher, content marketing evangelist, cloud and blockchain enthusiast.","sameAs":["https:\/\/www.linkedin.com\/in\/joe-arputhan-68b90523\/"],"url":"https:\/\/www.securekloud.com\/blog\/author\/joe-arputhan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/comments?post=277"}],"version-history":[{"count":4,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/277\/revisions"}],"predecessor-version":[{"id":1096,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/277\/revisions\/1096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/media\/281"}],"wp:attachment":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/media?parent=277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/categories?post=277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/tags?post=277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}