| Internet-Draft | IPSIE AL1 SCIM | February 2026 |
| Schreiber, et al. | Expires 24 August 2026 | [Page] |
This document defines a profile for SCIM 2.0 to meet the security and interoperability requirements for identity lifecycle management within enterprises. Within the context of SCIM, The profile establishes requirements for provisioning, account management, client authentication, and identity synchronization.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 24 August 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
This note is to be removed before publishing as an RFC.¶
Source for this draft and an issue tracker can be found at https://github.com/jischr/ipsie-scim-al1-profile.¶
This document defines the IPSIE Account Lifecycle 1 (AL1) Profile for SCIM 2.0. It provides a clear reference for SCIM deployments that require a well-defined security baseline meeting best practices for interoperable enterprise identity management.¶
The profile addresses critical aspects of secure identity management, with particular emphasis on:¶
By adhering to this profile, organizations can implement SCIM-based integrations that meet stringent security requirements while ensuring interoperability across different implementations.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
SCIM¶
The System for Cross-domain Identity Management as defined in [RFC7643] and [RFC7644]¶
SCIM Client¶
An application that uses the SCIM protocol to access or manage identity data maintained by the SCIM service provider (SP). The client initiates SCIM HTTP requests to a SCIM service provider. To clarify the relationship in terms of identity management, the Identity Provider (IdP) is the SCIM Client and initiates requests to the SP, which is the SCIM Server.¶
SCIM Server (also referred to as SCIM Service Provider)¶
An HTTP web application that provides identity information via the SCIM protocol. To clarify the relationship in terms of identity management, the SP is the SCIM Server and receives the requests from the IdP, which is the SCIM Client.¶
Role¶
A set of permissions. Any user or account within the same role receives the predefined ability to access a resource and/or perform an action.¶
Identity Service or Identity Provider (IdP)¶
Acts as the SCIM client, initiating all provisioning, updates, and deprovisioning operations.¶
Application¶
Acts as the SCIM server or service provider, hosting SCIM endpoints and processing all provisioning requests.¶
Note: When SCIM is applied to the context of IPSIE, the Identity Service acts as the SCIM client and the Application acts as the SCIM service provider. The document will use the Role terms below for consistency across IPSIE Profiles.¶
The Identity Service and Application MUST use OAuth 2.0 [RFC6749] for authentication and authorization of SCIM protocol.¶
Editor's Note: This section should be expanded and may need to reference the IPSIE Session Lifecycle 1 (SL1) profile.¶
The following requirements ensure consistent and secure handling of access tokens and authorization server configuration:¶
Requirements for user provisioning operations are defined in this section.¶
The Application MUST include the following attributes in the User schema:¶
Additionally, the "externalId" attribute defined as optional in the "common" resource schema in [RFC7643] MUST be supported by the Application.¶
The Application MUST NOT support the "password" attribute.¶
The Identity Service MUST NOT include the "password" attribute in any SCIM requests.¶
A user resource may have various credentials or similar data associated with them. This includes passwords, password hashes, private keys, and multi-factor authentication data such as Time-Based One-Time Password (TOTP) seeds. The Application MUST NOT define attributes containing credentials in custom schemas. The Identity Service MUST NOT send values for user credentials in any SCIM requests.¶
DZ note Set the credential-related requirements as aggressively restrictive for now, can define any exceptions or other rules later after discussion.¶
The Identity Service and the Application MUST support user creation via POST /Users.¶
The Identity Service and the Application MUST support updating a user's attribute values via the SCIM operation PATCH /Users/{id}.¶
Changes to the user activation status, such deactivation and reactivation, are performed by the SCIM operation PATCH /Users/{id}¶
The Identity Service SHOULD propagate user deactivation events to the Application within 5 minutes of the user being deactivated.¶
The Application SHOULD respond to user deactivation events by revoking the ability for the user to continue accessing the Application, including the revocation of currently active sessions. Session revocation mechanisms are outside the scope of this profile. Revocation SHOULD occur within 5 minutes of receiving the deactivation request.¶
When a user account is deactivated, all access mechanisms and authorizations associated with that account MUST also be deactivated. This includes, but is not limited to:¶
The Application MUST allow reactivation of a deactivated user.¶
Applications MAY allow users to be deleted via the SCIM operation DELETE /Users/{id}.¶
After a user is deleted, the Application MUST allow the creation of a new user with the same username.¶
Editor's Note: Need to clarify implications for maintaining user data and avoiding conflicts when recreating users with the same username.¶
The Application MUST support retrieval of all users via the SCIM operation GET /Users.¶
The Application MUST support at least one pagination method and SHOULD avoid returning more than 1,000 users per page. Support for cursor-based pagination by the Application is RECOMMENDED.¶
The Application MUST support retrieving a single user by ID via the SCIM operation GET /Users/{id}.¶
The Application MUST support the SCIM "filter" query parameter, performed via the SCIM operation: GET /Users?filter={filterExpression}¶
Application Providers MUST support the following filter expressions:¶
Requirements for group provisioning operations are defined in this section. The Application MAY implement support for groups and MUST follow the below requirements if it does.¶
The Application MUST include the following attributes in the Group schema:¶
Additionally, the "externalId" attribute defined as optional in the "common" resource schema in [RFC7643] MUST be supported by the Application.¶
The Application SHOULD NOT allow multiple groups to have the same value for the "displayName" attribute".¶
The Identity Service SHOULD use a unique value for the "displayName" attribute.¶
The Identity Service and the Application MUST support group creation via POST /Groups.¶
The Application MUST allow groups to be created with zero members.¶
The Application MUST support retrieval of all groups via the SCIM operation GET /Groups.¶
The Application MUST support the attributes= and excludedAttributes= parameters.¶
The Identity Service SHOULD include excludedAttributes=members in the HTTP URI when listing all groups.¶
The Application MUST support retrieving a single group by ID via the SCIM operation GET /Groups/{id}.¶
The Application MUST support the SCIM "filter" query parameter, performed via the SCIM operation: GET /Groups?filter={filterExpression}¶
The Application MUST support the following filter expressions for groups:¶
The Identity Service and the Application MUST support updating a group's attribute values via the SCIM operation PATCH /Groups/{id}.¶
The Application MUST support the inclusion of at least 50 add or remove operations on the "members" attribute in a single PATCH request.¶
The Identity Service SHOULD compile multiple changes to the "members" attribute into a single PATCH request.¶
Application MUST host a /ResourceTypes endpoint, as defined in Section 4 of [RFC7644].¶
Application Providers MUST host a /ServiceProviderConfig endpoint to describe the operations they support, as defined in Section 4 of [RFC7644]¶
The operations MUST include, at minimum, the set of SCIM capabilities required for compatibility with this IPSIE profile.¶
Application Providers MUST host a /Schemas endpoint to describe the supported schemas, as defined in Section 4 of [RFC7644]. There must be a schema for each implemented resource type. Schemas returned by the Application MUST include all implemented attributes and MUST NOT include attributes that are not implemented.¶
For SCIM security considerations, see [RFC7643] and [RFC7644]¶
Additionally, the following requirements are included to address security considerations.¶
This document has no IANA actions.¶
Implementation of all mandatory requirements in this profile will result in a SCIM 2.0 deployment that satisfies IPSIE Identity Lifecycle Level 1 (IL1). Specifically:¶
By conforming to this profile, implementations will achieve a consistent, secure, and interoperable baseline for enterprise identity lifecycle management.¶