Why spend countless weeks or months every time you need to implement a new SAML connection?

SSO Easy's EasyConnect SAML solutions eliminates the time, cost, complexity and risk of SAML implementations.

SCIM for Active Directory


SCIM User Provisioning for Active Directory

SSO Easy enables SCIM User Provisioning for organizations that leverage Microsoft's Active Directory.

With SSO Easy's Award-Winning "SCIM for Active Directory" Solution, customers can:

  • Run Microsoft Active Directory (AD) server(s) on-premise
  • ....or....Run Active Directory Federation Services (ADFS)
  • Enable SCIM User Provisioning
  • Connect with any SCIM compliant SaaS providers

 

SSO Easy's SCIM for Active Directory Solution implementations are:

  • Robust and scalable
  • Quick
  • Easy
  • Cost-effective

 

Free Trials are available

With proper planning and coordination, Free Trials are typically completed in less than 15 minutes.

 

About SCIM

What is SCIM Provisioning?

SCIM is an open standard that simplifies cloud identity management and allows user provisioning to be automated across multiple domains.

SCIM provisioning allows companies to manage user identities in the cloud efficiently and easily add or remove users within their enterprise -- benefiting budgets, reducing risk, and streamlining workflows.

Without SCIM, IT administrators would have to manually add identifying information needed by the application about users who are allowed to use the application. This manual process takes longer and has a higher margin for error. Using SCIM as a standard protocol for cloud-based applications and services solves this problem and streamlines the management of users, groups, and devices.

 

How SCIM Works

SCIM is a REST and JSON-based protocol that defines a client and server role. A client is usually an identity provider (IDP), like Active Directory, or AD, that contains a robust directory of user identities. A service provider (SP) is usually a SaaS app, like Box or Slack, that needs a subset of information from those identities. When changes to identities are made in the IdP, including create, update, and delete, they are automatically synced to the SP according to the SCIM protocol. The IdP can also read identities from the SP to add to its directory and to detect incorrect values in the SP that could create security vulnerabilities. For end users, this means that they have seamless access to applications for which they’re assigned, with up-to-date profiles and permissions.

 

SCIM Benefits

There are various benefits of SCIM provisioning, including:

  • Improve SaaS user management via self-service
  • Eliminate excess SaaS user fees
  • Automate user onboarding and offboarding
  • Centralize identity management
  • Reduce operational costs
  • Eliminate manual errors
  • More comprehensive SSO management

 

With SCIM, admins no longer need to manually create and delete user accounts in web apps -- which saves them valuable time and reduces the chance for errors in the authorization levels granted to users.

 

About SSO Easy

SSO Easy, founded in 2010, is a leader in cloud based Identity and Access Management (IAM) solutions. SSO Easy's Single Sign On and User Provisioning solutions are deployed in production by thousands of clients, enables secure and seamless Single Sign On for millions of users, who access thousands of SaaS services and internal applications.  SSO Easy solutions, which leverage industry standard protocols, including SAML and SCIM, are implemented quickly, easy, and cost-effective.  Free Trials of SSO Easy solutions are available -- typically completed in 1 hour or less.

 

About Active Directory (AD)

Active Directory (AD) is a database and set of services, made by Microsoft, that connect users with the network resources they need to get their work done.

The database (or directory) contains critical information about your environment, including what users and computers there are and who’s allowed to do what. For example, the database might list 100 user accounts with details like each person’s job title, phone number and password. It will also record their permissions.

The services control much of the activity that goes on in your IT environment. In particular, they make sure each person is who they claim to be (authentication), usually by checking the user ID and password they enter, and allow them to access only the data they’re allowed to use (authorization).

Please fill out the form below to learn more about our solutions
Send