Configuring SAML with SCIM-compliant provider
You can configure SAML with SCIM-compliant provider to allow users to authenticate with a central identity provider (IdP) and access multiple applications using SSO. The SCIM provider can manage user identities and permissions with the SCIM API and use SAML for authentication and authorization.
You can configure SAML with SCIM-compliant provider with one of the following methods:
- Configuring SAML with SCIM-compliant provider using the your product console
- Configuring SAML with SCIM-compliant provider using the your product console
Configuring SAML with SCIM-compliant provider using the your product console
To configure SAML with SCIM-compliant provider, complete the following steps:
-
Log on to the console as an administrator.
-
From the navigation menu, click Administer > Identity providers.
-
Click Create Connection. Select SAML 2.0 as the protocol type and click Next. The New SAML Connection page is displayed.
-
In the New SAML Connection page, select the Connection details tab. It contains the following options that you are required to fill:
-
Name
: A name for the SAML connection. -
Description
: Description of the SAML connection.
-
-
Enable This is a SCIM-compliant identity provider toggle option.
-
Select the Token attribute-mapping tab. It contains the following options that you are required to fill:
Subject
Given name
Family name
Groups
Email
See the following notes:
-
By default, the Token attribute-mapping values are pre-defined if you do not specify the mapping. It is recommended to modify the default values according to the SAML claim. The following default values are displayed if you do not specify the mapping values:
Subject
: uidGiven name
: firstNameFamily name
: lastNameGroups
: blueGroupsEmail
: emailAddress
-
The
uniqueSecurityName
option is not supported from the product console. If theuniqueSecurityName
is required in Token attribute mapping, see Different schema elements for IdP V3.
-
Select To identity provider tab. Click Download metadata link to download the SAML 2.0 metadata. Once you download the metadata, you can upload that metadata to your identity provider to generate identity provider metadata.
-
Select From identity provider tab. Upload the identity provider metadata in
*.xml
file that is supplied by your identity provider. -
The SCIM configuration tab is enabled when you choose to configure SAML with SCIM dependency. It contains the following fields:
Scim base path
: https://bedrock-iam.verify.ibm.com/v2.0/Grant type
: client_credentialsToken URL
: https://bedrock-iam.verify.ibm.com/v1.0/endpoint/default/tokenClient ID
: Enter the client ID of the IBM Security VerifyClient Secret
: Enter the client secret of the IBM Security Verify
Also, you need to configure the SCIM attribute mapping for the
user
andgroup
resources. By default, these fields are pre-defined as theprincipalName
in bothuser
andgroup
attributes. It is recommended to modify the values based on the SCIM IdP configuration. -
Click Create.
Configuring SAML with SCIM-compliant provider using the your product console
Register the IdP V3 with IBM Security Verify that supports SCIM-enabled IdP with SAML. For more information, see IdP V3 registration with IBM Security Verify.
Example of SAML with SCIM-compliant server
SAML with SCIM provisioning server
The QRadar Suite retrieves the users from the IdP with the SCIM request through the foundational services operator.