IBM Support

How to add sAMAccountName attribute in the SCIM Configuration

How To


Summary

SCIM (System for Cross-Domain Identity Management) is a standardized protocol used to manage user and group identities across both cloud and on-premise applications. The primary role of SCIM in IVIA is to expose identity data stored in the LDAP directory or IVIA's internal registry to external systems, enabling secure and efficient user and group provisioning (create), de-provisioning (delete), update, and read operations.

By default, when configuring MS Windows AD as an LDAP type in an AAC Server Connection, the “sAMAccountName” attribute does not appear in the “User DN Attribute” & “User ID Attribute” dropdowns within the LDAP Server section under the User Profile tab of the SCIM Configuration.

Here, the “sAMAccountName” attribute is important because it typically serves as the unique user identifier when integrating with Microsoft Windows Active Directory (MS AD). SCIM requires a userID attribute to map its userName field, which is a mandatory field used to uniquely identify users across create, read, update, and delete (CRUD) operations.

On the AD side, this attribute represents the user's login name (such as john.wick) and is commonly used for authN. By configuring that as the “User ID Attribute” in the SCIM, IVIA ensures that identity operations align with how users are identified and authenticated across enterprise systems. Without mapping this attribute, SCIM may not correctly identify or manage users in an Active Directory-backed identity environment.

Please, follow the steps to add the sAMAccountName attribute

Document Location

Worldwide


[{"Type":"MASTER","Line of Business":{"code":"LOB77","label":"Automation Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSRN3F","label":"IBM Verify Identity Access"},"ARM Category":[{"code":"a8m0z000000cxuMAAQ","label":"Security Verify Access-\u003EAdvanced Access Control"},{"code":"a8mKe0000008OfJIAU","label":"Verify Identity Access"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"11.0.0;11.0.1"},{"Type":"MASTER","Line of Business":{"code":"LOB77","label":"Automation Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSRGTL","label":"IBM Security Verify Access"},"ARM Category":[{"code":"a8m0z000000cxuHAAQ","label":"Security Verify Access"},{"code":"a8m0z000000cxuMAAQ","label":"Security Verify Access-\u003EAdvanced Access Control"}],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"10.0.0;10.0.1;10.0.2;10.0.3;10.0.4;10.0.5;10.0.6;10.0.7;10.0.8;10.0.9"}]

Log InLog in to view more of this document

This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.

Document Information

More support for:
IBM Verify Identity Access

Component:
Security Verify Access->Advanced Access Control, Verify Identity Access

Software version:
11.0.0, 11.0.1

Document number:
7234682

Modified date:
29 May 2025

UID

ibm17234682

Manage My Notification Subscriptions