Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
711:user_groups_permissions_scim [2024/09/18 15:50] – [Participant groups] Nerlich, Axel | 711:user_groups_permissions_scim [2025/03/25 12:58] (current) – [Mapping the license type] Nerlich, Axel | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== SCIM provisioning ====== | ====== SCIM provisioning ====== | ||
- | SCIM, or System for Cross-domain Identity Management, is an open standard for the provisioning and deprovisioning of users and user groups to enterprise applications. It is able to significantly simplify the rollout of users and their permissions | + | SCIM, or System for Cross-domain Identity Management, is an open standard for the provisioning and deprovisioning of users and user groups to enterprise applications. It is able to significantly simplify the rollout of users and their permission group assignments |
- | Stages V7.11 implements the SCIM standard version 2.0, which is supported by most modern identity providers like Okta Lifecycle Management or Microsoft Entra ID. They provide the capability to configure the connection to the Stages application. | + | Stages V7.11 implements the SCIM standard version 2.0 (see [[https:// |
Before connecting with Stages, an API token has to be created. This will then be used by the identity provider to authenticate against the Stages application. | Before connecting with Stages, an API token has to be created. This will then be used by the identity provider to authenticate against the Stages application. | ||
Line 9: | Line 9: | ||
===== Setting the Token secret ===== | ===== Setting the Token secret ===== | ||
- | Stages generates its API tokens on the basis of a unique secret that can only be set by the Stages administrator. This should be a random string value with at least 32 two characters. This value should be stored in the file conf/ | + | Stages generates its API tokens on the basis of a unique secret that can only be set by the Stages administrator. This should be a random string value with at least 32 characters. This value should be stored in the file conf/ |
- | '' | + | <code -> |
+ | apitoken.secret = < | ||
+ | </ | ||
In the conf/ | In the conf/ | ||
- | '' | + | <code -> |
+ | < | ||
+ | </ | ||
After that, a service restart is necessary. | After that, a service restart is necessary. | ||
Line 30: | Line 34: | ||
Requests to the Stages REST endpoint must contain the value of a valid API token in the Authorization header in the following format: Bearer < | Requests to the Stages REST endpoint must contain the value of a valid API token in the Authorization header in the following format: Bearer < | ||
- | |||
===== Defining attribute mappings ===== | ===== Defining attribute mappings ===== | ||
Line 55: | Line 58: | ||
| '' | | '' | ||
| '' | | '' | ||
+ | |||
+ | ===== Mapping the license type ===== | ||
+ | |||
+ | The license type of a user can be set with the following SCIM core attributes for the User resource: | ||
+ | |||
+ | * '' | ||
+ | * '' | ||
+ | |||
+ | Possible Stages license type idents: NONE, ADMIN, ADMIN_ONLY, AUTH_PROCESS_READER, | ||
+ | |||
+ | For license types in the default license pool, the license pool name is omitted, but the double underscore separator is kept. Example value: %%PERSONAL_QM__%% | ||
+ | |||
===== Addressing the SCIM endpoint ===== | ===== Addressing the SCIM endpoint ===== | ||
Line 68: | Line 83: | ||
However, participants (defined under Administration > Process Release > Participants) are another powerful way to allocate permissions for specific workspace contexts to a specific set of users. | However, participants (defined under Administration > Process Release > Participants) are another powerful way to allocate permissions for specific workspace contexts to a specific set of users. | ||
- | Participants are defined globally but user assignments are workspace-specific (under Management > Participants). Therefore every combination of participant and workspace can be seen as another user permission group. | + | Participants are defined globally but user assignments are workspace-specific (under Management > Participants). Therefore every combination of participant and workspace can be seen as another user permission group. |
{{scim_settings.png}} | {{scim_settings.png}} | ||