Skip to Content
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
book

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

by Morey J. Haber, Darran Rolls
December 2019
Intermediate to advanced content levelIntermediate to advanced
205 pages
5h 2m
English
Apress
Content preview from Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
© Morey J. Haber, Darran Rolls 2020
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/978-1-4842-5165-2_16

16. System for Cross-Domain Identity Management (SCIM)

Morey J. Haber1  and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

System for Cross-Domain Identity Management (SCIM) is a standard for automating the exchange of user identity information between identity domains, identity-based solutions, and participating information technology resources. SCIM uses a standardized REST API and data formatted in JSON or XML to allow interoperating solutions to exchange information in a standardized way. The standard simplifies the methodology for provisioning and deprovisioning (cradle to grave) of an identity and associated accounts ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Michael Schwartz, Maciej Machulak

Publisher Resources

ISBN: 9781484251652Purchase LinkPublisher Website