Why spend countless weeks or months every time you need to implement a new SAML connection?

SSO Easy's EasyConnect SAML solutions eliminates the time, cost, complexity and risk of SAML implementations.

SCIM for ADFS - User Provisioning with Workteam

SCIM User Provisioning From Active Directory Federation Services With Any SCIM Compliant SaaS Solution - Including Workteam

SSO Easy enables System for Cross-domain Identity Management (SCIM) User Provisioning to ANY SCIM COMPLIANT SaaS solution -- including Workteam -- while leveraging existing Microsoft Active Directory Federation Services (ADFS) server(s).  This allows organizations to better manage Workteam user subscriptions and fees, without having to upgrade from their existing Microsoft ADFS implementation.  Organizations improve centralized security, while reducing operating costs.

With the SCIM For ADFS Solution, SSO Easy customers can:

  • Leverage SCIM (System for Cross-domain) protocol
  • Leverage current MSFT Active Directory Federation Services (ADFS)
  • ....or.... Leverage current "On Premise" Active Directory server(s)
  • Enable SCIM User Provisioning with Workteam
  • Enable SCIM User Provisioning with ANY / ALL SCIM compliant SaaS vendors


SSO Easy's SCIM Active Directory Federation Services Solution implementations are:

  • Robust and scalable
  • Quick
  • Easy
  • Cost-effective


Free Trials are available.

With proper planning and coordination, Free Trials are typically completed in less than 15 minutes.


The User Experience - SCIM Provisioning Using Active Directory Federation Services (ADFS)

With SCIM User Provisioning for Workteam using ADFS, users experience the following:

  • Users login to their local Active Directory Federation Services (AD FS) server
  • ADFS leverages SCIM, using SSO Easy's integrated SCIM for ADFS solution
  • SCIM protocols are shared with Workteam, who are SCIM compliant on their side
  • User gains SCIM enabled access to the Workteam service


SCIM Overview

What is SCIM Provisioning?

SCIM is an open standard that simplifies cloud identity management and allows user provisioning to be automated across multiple domains.

SCIM provisioning allows companies to manage user identities in the cloud efficiently and easily add or remove users within their enterprise -- benefitting budgets, reducing risk, and streamlining workflows.

Without SCIM, IT administrators would have to manually add identifying information needed by the application about users who are allowed to use the application. This manual process takes longer and has a higher margin for error. Using SCIM as a standard protocol for cloud-based applications and services solves this problem and streamlines the management of users, groups, and devices.


How SCIM Works

SCIM is a REST and JSON-based protocol that defines a client and server role. A client is usually an identity provider (IDP), like Active Directory, or AD, that contains a robust directory of user identities. A service provider (SP) is usually a SaaS app, like Box or Slack, that needs a subset of information from those identities. When changes to identities are made in the IdP, including create, update, and delete, they are automatically synced to the SP according to the SCIM protocol. The IdP can also read identities from the SP to add to its directory and to detect incorrect values in the SP that could create security vulnerabilities. For end users, this means that they have seamless access to applications for which they're assigned, with up-to-date profiles and permissions.


SCIM Benefits

There are various benefits of SCIM provisioning, including:

  • Improve SaaS user management via self-service
  • Eliminate excess SaaS user fees
  • Automate user onboarding and offboarding
  • Centralize identity management
  • Reduce operational costs
  • Eliminate manual errors
  • More comprehensive SSO management


With SCIM, admins no longer need to manually create and delete user accounts in web apps -- which saves them valuable time and reduces the chance for errors in the authorization levels granted to users.


About Workteam

Workteam provides OKR-based goal management, work management and coaching tools to help transform teams into focused, high performing teams.       


About SSO Easy

SSO Easy, founded in 2010, is a leader in cloud based Identity and Access Management (IAM) solutions. SSO Easy's Single Sign On and User Provisioning solutions are deployed in production by thousands of clients, enables secure and seamless Single Sign On for millions of users, who access thousands of SaaS services and internal applications.  SSO Easy solutions, which leverage industry standard protocols, including SAML and SCIM, are implemented quickly, easy, and cost-effective.  Free Trials of SSO Easy solutions are available -- typically completed in 1 hour or less.


Active Directory Federation Services (ADFS) - Summary

Active Directory Federation Service (ADFS), made by Microsoft, enables Federated Identity and Access Management by securely sharing digital identity and entitlements rights across security and enterprise boundaries. Microsoft ADFS extends the ability to use single sign-on functionality that is available within a single security or enterprise boundary to Internet-facing applications to enable customers, partners, and suppliers a streamlined user experience while accessing the web-based applications of an organization.


About Active Directory (AD) - Summary

Active Directory (AD) is a database and set of services, made by Microsoft, that connect users with the network resources they need to get their work done.

The database (or directory) contains critical information about your environment, including what users and computers there are and who's allowed to do what. For example, the database might list 100 user accounts with details like each person's job title, phone number and password. It will also record their permissions.

The services control much of the activity that goes on in your IT environment. In particular, they make sure each person is who they claim to be (authentication), usually by checking the user ID and password they enter, and allow them to access only the data they're allowed to use (authorization).

Please fill out the form below to learn more about our solutions