Identity Standards Blog
Copied!
Home
Options
4,006
Pamela Dingle on 10-03-2019 09:00 AM
1,586
Pamela Dingle on 05-23-2019 12:32 PM
2,444
Pamela Dingle on 04-25-2019 10:00 AM
1,698
Pamela Dingle on 02-15-2019 09:59 AM
21.1K
Pamela Dingle on 11-20-2018 09:00 AM
3,202
Pamela Dingle on 11-19-2018 08:01 PM
Latest Comments
@ghislaincote this can be used in conjunction with the authentication based provisioning that you're talking about. More and more apps support OAuth2/OIDC and also SCIM. The main customer benefit in that scenario is deprovisioning (ensuring that the account is removed when someone doesn't need acces...
0 Likes
Thanks for the article @Pamela Dingle ! I am new to this topic. My first reaction was to compare SCIM with dynamic user provisioning based on authentication and roles (ie: a user created in a SaaS provider after a successful OAuth2/OIDC login). I guess SCIM applies more when we NEED to create/mainta...
0 Likes
Hi, I am absolutely delighted by the increasing support for passwordless authentication. Question is when will we be able to authenticate Windows Office Apps with USB security keys or Hello? Thanks, Mads
0 Likes
hey @Pamela Dingle, I'll wait for your next blog where need to understand how to develop an SCIM endpoint. Please keep us posted. Thanks for sharing this blog and this is very informative.
3 Likes
I am wondering how I can export (backup) my keys and import (move) them to another device. Hardware authenticators typically get lost or broken over time, and Yubico clearly states no two authenticators are equivalent. Not everyone is like me using many devices at the same time, but at least PCs or ...
0 Likes