scim-docs/public/index.xml

40 lines
7.7 KiB
XML
Raw Normal View History

2024-11-04 16:09:03 +00:00
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Scim - Libre.sh</title>
<link>//localhost:1313/</link>
<description>Recent content on Scim - Libre.sh</description>
<generator>Hugo</generator>
<language>en</language>
<atom:link href="//localhost:1313/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Identity Management</title>
<link>//localhost:1313/overview/identity-management/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>//localhost:1313/overview/identity-management/</guid>
<description>&lt;picture&gt;&#xA; &lt;source srcset=&#34;media/small/illus-basics.svg&#34; media=&#34;(max-width: 768px)&#34;&gt;&#xA; &lt;img src=&#34;media/illus-basics.svg&#34; alt=&#34;Illustation of the basics of identity magagment&#34;&gt;&#xA;&lt;/picture&gt;&#xA;&lt;p&gt;&lt;section class=&#34;grid&#34;&gt;&#xA; &#xA;&lt;div class=&#34;card flex&#34;&gt;&#xA; &#xA; &lt;svg width=&#34;39&#34; height=&#34;39&#34; viewBox=&#34;0 0 39 39&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34;&gt;&#xA;&lt;path fill-rule=&#34;evenodd&#34; clip-rule=&#34;evenodd&#34; d=&#34;M26.591 14.1817C26.591 16.0624 25.8439 17.866 24.5141 19.1958C23.1843 20.5256 21.3807 21.2726 19.5001 21.2726C17.6195 21.2726 15.8159 20.5256 14.4861 19.1958C13.1563 17.866 12.4092 16.0624 12.4092 14.1817C12.4092 12.3011 13.1563 10.4975 14.4861 9.1677C15.8159 7.8379 17.6195 7.09082 19.5001 7.09082C21.3807 7.09082 23.1843 7.8379 24.5141 9.1677C25.8439 10.4975 26.591 12.3011 26.591 14.1817ZM23.0455 14.1817C23.0455 15.122 22.672 16.0238 22.0071 16.6887C21.3422 17.3536 20.4404 17.7272 19.5001 17.7272C18.5598 17.7272 17.658 17.3536 16.9931 16.6887C16.3282 16.0238 15.9546 15.122 15.9546 14.1817C15.9546 13.2414 16.3282 12.3396 16.9931 11.6747C17.658 11.0098 18.5598 10.6363 19.5001 10.6363C20.4404 10.6363 21.3422 11.0098 22.0071 11.6747C22.672 12.3396 23.0455 13.2414 23.0455 14.1817Z&#34; /&gt;&#xA;&lt;path fill-rule=&#34;evenodd&#34; clip-rule=&#34;evenodd&#34; d=&#34;M19.5 0C8.73068 0 0 8.73068 0 19.5C0 30.2693 8.73068 39 19.5 39C30.2693 39 39 30.2693 39 19.5C39 8.73068 30.2693 0 19.5 0ZM3.54545 19.5C3.54545 23.205 4.80941 26.6157 6.92782 29.3245C8.41555 27.3707 10.3348 25.7874 12.5357 24.6982C14.7366 23.609 17.1595 23.0433 19.6152 23.0455C22.0391 23.0432 24.4316 23.5942 26.6103 24.6565C28.789 25.7188 30.6965 27.2644 32.1874 29.1755C33.7234 27.161 34.7576 24.8097 35.2044 22.3161C35.6512 19.8226 35.4979 17.2584 34.757 14.8359C34.0161 12.4134 32.709 10.2021 30.9438 8.38507C29.1787 6.568 27.0062 5.19739 24.6061 4.38663C22.2061 3.57587 19.6475 3.34828 17.142 3.72268C14.6366 4.09708 12.2563 5.06272 10.1981 6.53969C8.13991 8.01665 6.46303 9.9625 5.30618 12.2162C4.14933 14.4699 3.54577 16.9667 3.54545 19.5ZM19.5 35.4545C15.8375 35.46 12.2855 34.2001 9.44509 31.8878C10.5884 30.2511 12.1101 28.9148 13.8808 27.9926C15.6515 27.0703 17.6188 26.5895 19.6152 26.5909C21.5868 26.5893 23.5303 27.0581 25.2843 27.9584C27.0383 28.8587 28.5522 30.1645 29.7003 31.7673C26.8378 34.1546 23.2273 35.4598 19.5 35.4545Z&#34; /&gt;&#xA;&lt;/svg&gt;&#xA;&#xA; &#xA; &lt;h4 id=&#34;authentication&#34;&gt;Authentication&lt;/h4&gt;&#xA;&lt;p&gt;Who is this user ?&lt;/p&gt;</description>
</item>
<item>
<title>The solution, SCIM</title>
<link>//localhost:1313/overview/scim/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>//localhost:1313/overview/scim/</guid>
<description>&lt;img alt=&#34;Scim diagram&#34; src=&#34;media/scim-diagram-ressource.svg&#34; class=&#34;float-right&#34;&gt;&#xA;&lt;h3 id=&#34;quick-overview&#34;&gt;Quick overview&lt;/h3&gt;&#xA;&lt;p&gt;The &lt;strong&gt;SCIM protocol&lt;/strong&gt; is an application-level protocol for &lt;strong&gt;provisioning&lt;/strong&gt; and &lt;strong&gt;managing identity&lt;/strong&gt; data specified through SCIM schemas.&#xA;Its intent is to &lt;strong&gt;reduce the cost and complexity&lt;/strong&gt; of user management operations.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;A &lt;strong&gt;common existing user schema and deployments&lt;/strong&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Extension models&lt;/strong&gt;&lt;/li&gt;&#xA;&lt;li&gt;Placing specific emphasis on &lt;strong&gt;simplicity of development and integration&lt;/strong&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Applying existing models&lt;/strong&gt; (authentication, authorization, and privacy)&lt;/li&gt;&#xA;&lt;li&gt;Binding documents to provide &lt;strong&gt;patterns for exchanging this schema using standard protocols&lt;/strong&gt;&lt;/li&gt;&#xA;&lt;li&gt;Easily improve &lt;strong&gt;GDPR compliance&lt;/strong&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Consolidate the user experience&lt;/strong&gt; across multiple FOSS applications as one platform&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;section class=&#34;grid&#34;&gt;&#xA; &#xA;&lt;div class=&#34;card flex&#34;&gt;&#xA; &#xA; &lt;h4 id=&#34;resource-based&#34;&gt;Resource based&lt;/h4&gt;&#xA;&lt;p&gt;In SCIM 2.0 &lt;strong&gt;a Resource is the common denominator&lt;/strong&gt; and all SCIM objects are derived from it.&lt;/p&gt;</description>
</item>
<item>
<title>How do we use SCIM ?</title>
<link>//localhost:1313/overview/scenario/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>//localhost:1313/overview/scenario/</guid>
<description>&lt;img alt=&#34;Scim diagram&#34; src=&#34;media/scim-diagram-1.svg&#34; class=&#34;float-right&#34;&gt;&#xA;&lt;h3 id=&#34;scim-client-and-server&#34;&gt;SCIM Client and Server&lt;/h3&gt;&#xA;&lt;p&gt;While SCIM is a protocol for provisioning and managing identity, there &lt;strong&gt;isnt really a concept of Identity Provider (IdP)&lt;/strong&gt;. In SCIM architecture, there is (only) &lt;strong&gt;the Client, making the HTTP calls and the Server receiving them&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Our use of SCIM&lt;/strong&gt;&#xA;Our chosen architecture is as follows : a &lt;strong&gt;SCIM Client collocated with the Identity Provider&lt;/strong&gt; will reflect changes by calling all &lt;strong&gt;SCIM Server collocated with each application&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>Why is SCIM better ?</title>
<link>//localhost:1313/overview/comparison/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>//localhost:1313/overview/comparison/</guid>
<description>&lt;h3 id=&#34;others-management-protocols&#34;&gt;Others management protocols&lt;/h3&gt;&#xA;&lt;div id=&#34;Ldap&#34; class=&#34;switch-box&#34;&gt;&#xA; &lt;p&gt;With this LDAP approach &lt;strong&gt;everything is centralized&lt;/strong&gt; (except authorization).&lt;/p&gt;&#xA;&lt;picture&gt;&#xA; &lt;source srcset=&#34;media/small/ldap-diagram.svg&#34; media=&#34;(max-width: 768px)&#34;&gt;&#xA; &lt;img src=&#34;media/ldap-diagram.svg&#34; alt=&#34;LDAP diagram&#34;&gt;&#xA;&lt;/picture&gt;&#xA;&lt;p&gt;&lt;strong&gt;Everything speaks the LDAP protocol langage.&lt;/strong&gt; Identities are stored in an LDAP directory, which is provisioned via LDAP protocol. Authentication is done by the application that asks the users credentials and validates them against the directory via LDAP protocol.&lt;/p&gt;&#xA;&#xA;&lt;/div&gt;&#xA;&#xA;&lt;div id=&#34;Ldap&amp;#43;SSO&#34; class=&#34;switch-box&#34;&gt;&#xA; &lt;p&gt;This architecture &lt;strong&gt;tackles the two main drawbacks of the only LDAP approach&lt;/strong&gt; : the missing single sign-on and the security vulnerability. &lt;strong&gt;Authentication is delegated to other web protocols&lt;/strong&gt; (like OAuth, OIDC or SAML). This way, the user logs in only once to the identity provider.&lt;/p&gt;</description>
</item>
</channel>
</rss>