Article Content
Overview
The System for Cross-Domain Identity Management (SCIM) uses bearer tokens for authentication. These bearer tokens are generated against a user account.
|
Best Practice: We recommend creating a user account solely for the purpose of generating SCIM tokens, so that if a user is to leave their Org and their account gets deactivated, associated tokens will not become invalid. |
User Account Requirements
The user must have Administrator permissions to generate SCIM tokens.
Related Information/Setup
Please refer to the following articles for further information on using SCIM in Resolver:
Navigation
- Follow the steps to retrieve a user's ID.
- From the Home screen, click the Administration icon.
Administration Icon
- From the Administrator Settings menu, click the Admin Overview link.
Admin Overview Link
- From the Admin Overview screen, click the Swagger Docs tile under the Tools section.
Swagger Docs Tile
Generating SCIM Tokens
- From the Admin: Help screen, enter the keyword user in the search text box, then click the User topic from the results.
User API Topic
- Click the GET /user/users/me (who am I?) endpoint to open the parameters.
API Endpoint
- Click the Execute button.
Execute Button
- Record or copy the id number to your clipboard from the currentOrg section. This is the current org's internal ID.
CurrentORG ID Value
- Enter the keyword org in the search text box, then click the Org topic from the results.
Org API Topic
- Click the GET /user/org/{orgId}/user/{userId} (load a user org membership) endpoint to open the parameters.
API Endpoint
- Enter the Org ID number copied during step 4 in the orgId field.
OrgID Field
- Enter the user ID, copied during step 1 in the Navigation section, in the userId field.
UserID Field
- Click the Execute button.
Execute Button
- From the Response Body section, record or copy the id number to your clipboard. This is the user's org membership ID number.
ID Value
- Enter the keyword scim in the search text box, then click the scimTokens topic from the results.
scimTokens API Topic
- Click the POST /user/scimTokens (add a scim token) endpoint to open the parameters.
API Endpoint
- From the Parameters section, click the Click to Populate Example box to populate the template in the body text box.
Click to Populate Example Box
- In the body text box, delete the 0 in the orgMembershipId attribute, then enter the user's org membership ID number obtained in step 10. Enter a descriptive name for the SCIM token in the name attribute and define the domain (without the @ symbol) in the emailDomains attribute. If the IdP will be managing multiple domains, a comma-separated list can be used. The domains defined here should match those defined in the SSO setup.
- Click the Execute button.
Execute Button
- Copy the token attribute from the Response body and store it for safekeeping. For security purposes, once a token is generated, it cannot be retrieved. If you misplace a token, a new one must be generated and the former token deleted. Tokens are only active for 2 years from the date of creation, and will become inactive once they pass the tokenExpiry date.
Token Attribute
|
Tip: IT Administrators should schedule the token rotation so that it is not missed in the future. |