Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

scimgateway

Package Overview
Dependencies
Maintainers
1
Versions
144
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

scimgateway

SCIM Gateway

  • 2.1.12
  • Source
  • npm
  • Socket score

Version published
Weekly downloads
516
decreased by-55.59%
Maintainers
1
Weekly downloads
 
Created
Source

SCIM Gateway

Build Status npm Versionnpm Downloads chat disqus GitHub forks


Author: Jarle Elshaug

Validated through IdP's:

  • Broadcom/CA Identity Manager
  • Microsoft Azure Active Directory
  • OneLogin
  • Okta
  • Omada

Latest news:

  • Codebase moved from callback of h... to the the promise(d) land of async/await
  • Supports configuration by environments and external files
  • Health monitoring through "/ping" URL, and option for error notifications by email
  • Azure AD user provisioning including license management (e.g. Office 365), installed and configured within minutes!
  • Includes API Gateway for none SCIM/provisioning - becomes what you want it to become
  • Running SCIM Gateway as a Docker container

Overview

With SCIM Gateway we could do user management by using REST based SCIM 1.1 or 2.0 protocol. Gateway will translate incoming SCIM requests and expose CRUD functionality (create, read, update and delete user/group) towards destinations using endpoint specific protocols. Gateway do not require SCIM to be used, it's also an API Gateway that could be used for other things than user provisioning.

SCIM Gateway is a standalone product, however this document shows how the gateway could be used by products like Broadcom/CA Identity Manager.

Using Identity Manager, we could setup one or more endpoints of type SCIM pointing to the gateway. Specific ports could then be used for each type of endpoint, and the SCIM Gateway would work like a "CA Connector Server" communicating with endpoints.

Instead of using IM-SDK for building our own integration for none supported endpoints, we can now build new integration based on SCIM Gateway plugins. SCIM Gateway works with IM as long as IM supports SCIM.

SCIM Gateway is based on the popular asynchronous event driven framework Node.js using JavaScript. It is firewall friendly using REST webservices. Runs on almost all operating systems, and may load balance between hosts (horizontal) and cpu's (vertical). Could even be uploaded and run as a cloud application.

Following example plugins are included:

  • Loki (NoSQL Document-Oriented Database)
    Gives a SCIM endpoint located on SCIM Gateway
    Demonstrates user provisioning towards document-oriented database
    Using LokiJS for a fast, in-memory document-oriented database (much like MongoDB/PouchDB)
    Default gives two predefined test users loaded using in-memory only (no persistence)
    Setting {"persistence": true} gives persistence file store (no test users)
    Example of a fully functional SCIM Gateway plugin

  • RESTful (REST Webservice)
    Demonstrates user provisioning towards REST-Based endpoint
    Using plugin "Loki" as a REST endpoint

  • Forwardinc (SOAP Webservice)
    Demonstrates user provisioning towards SOAP-Based endpoint
    Using endpoint Forwardinc that comes with Broadcom/CA IM SDK (SDKWS) - wiki.ca.com
    Shows how to implement a highly configurable multi tenant or multi endpoint solution using baseEntity parameter

  • MSSQL (MSSQL Database)
    Demonstrates user provisioning towards MSSQL database

  • SAP HANA (SAP HANA Database)
    Demonstrates SAP HANA specific user provisioning

  • Azure AD (REST Webservices)
    Azure AD user provisioning including Azure license management (App Service plans) e.g. Office 365
    Using Microsoft Graph API
    Using customized SCIM attributes according to Microsoft Graph API
    Includes CA ConnectorXpress metafile for creating CA IM "Azure - ScimGateway" endpoint type

  • API (REST Webservices)
    Demonstrates API Gateway/plugin functionality using post/put/patch/get/delete
    None SCIM plugin, becomes what you want it to become.
    Endpoint complexity could be put in this plugin, and client could instead communicate through Gateway using your own simplified REST specification.
    One example of usage could be creation of tickets in ServiceDesk/HelpDesk and also the other way, closing a ticket could automatically approve/reject corresponding workflow in Identity Manager.

Installation

Install Node.js

Node.js is a prerequisite and have to be installed on the server.

Download the windows installer (.msi 64-bit) and install using default options.

Install SCIM Gateway

Open a command window (run as administrator)
Create your own package directory e.g. C:\my-scimgateway and install SCIM Gateway within this package.

mkdir c:\my-scimgateway
cd c:\my-scimgateway
npm init -y
npm install scimgateway --save

Please ignore any error messages unless soap WSSecurityCert functionality is needed in your custom plugin code. Module soap installation of optional dependency 'ursa' that also includes 'node-gyp' then needs misc. prerequisites to bee manually installed.

c:\my-scimgateway will now be <package-root>

index.js, lib and config directories containing example plugins have been copied to your package from the original scimgateway package located under node_modules.

If internet connection is blocked, we could install on another machine and copy the scimgateway folder.

Startup and verify default Loki plugin
node c:\my-scimgateway

Start a browser (note, IE does not support JSON content)

http://localhost:8880/ping
=> Health check with a "hello" response

http://localhost:8880/Users  
http://localhost:8880/Groups
or 
http://localhost:8880/Users?attributes=userName
http://localhost:8880/Groups?attributes=displayName  
=> Logon using gwadmin/password and two users / four groups should be listed  

http://localhost:8880/Users/bjensen
http://localhost:8880/Groups/Admins
=> Lists all attributes for specified user/group

"Ctrl + c" to stop the SCIM Gateway

For more functionality using browser (post/patch/delete) a REST extension/add-on is needed.

Tip, take a look at mocha test scripts located in folder node_modules\scimgateway\test\lib

Upgrade SCIM Gateway

Not needed after a fresh install

Check if newer versions are available:

cd c:\my-scimgateway
npm outdated

Lists current, wanted and latest version. No output on screen means we are running the latest version.

Upgrade to latest minor version:

cd c:\my-scimgateway
npm install scimgateway

Note, always backup/copy C:\my-scimgateway before upgrading. Custom plugins and corresponding configuration files will not be affected.

To force a major upgrade (version x.*.* => y.*.*) that will brake compability with any existing custom plugins, we have to include the @latest suffix in the install command: npm install scimgateway@latest

Configuration

index.js defines one or more plugins to be started. We could comment out those we do not need. Default configuration only starts the loki plugin.

const loki = require('./lib/plugin-loki')
// const restful = require('./lib/plugin-restful')
// const forwardinc = require('./lib/plugin-forwardinc')
// const mssql = require('./lib/plugin-mssql')
// const saphana = require('./lib/plugin-saphana')  // prereq: npm install hdb --save
// const api = require('./lib/plugin-api')
// const azureAD = require('./lib/plugin-azure-ad')

Each endpoint plugin needs a JavaScript file (.js) and a configuration file (.json). They both must have the same naming prefix. For SAP Hana endpoint we have:

lib\plugin-saphana.js
config\plugin-saphana.json

Edit specific plugin configuration file according to your needs.
Below shows an example of config\plugin-saphana.json

{
  "scimgateway": {
    "port": 8884,
    "localhostonly": false,
    "scim": {
      "version": "1.1",
      "customSchema": null,
      "customUniqueAttrMapping" : {
        "userName" : null,
        "displayName": null
      }
    },
    "log": {
      "loglevel": {
        "file": "debug",
        "console": "error"
      },
      "customMasking": []
    },
    "auth": {
      "basic": {
        "username": "gwadmin",
        "password": "password"
      },
      "bearer": {
        "token": null,
        "jwt": {
          "azure": {
            "tenantIdGUID": null
          },
          "standard": {
            "secret": null,
            "publicKey": null,
            "options": {
              "issuer": null
            }
          }
        }
      }
    },
    "certificate": {
      "key": null,
      "cert": null,
      "ca": null,
      "pfx": {
        "bundle": null,
        "password": null
      }
    },
    "emailOnError": {
      "smtp": {
        "enabled": false,
        "host": null,
        "port": 587,
        "proxy": null,
        "authenticate": true,
        "username": null,
        "password": null,
        "sendInterval": 15,
        "to": null,
        "cc": null
      }
    }
  },
  "endpoint": {
    "host": "hostname",
    "port": 30015,
    "username": "username",
    "password": "password",
    "saml_provider": "saml_provider_name"
  }
}

Configuration file have two main JSON objects: scimgateway and endpoint

Definitions in scimgateway object have fixed attributes but values can be modified. This object is used by the core functionality of the SCIM Gateway.

Definitions in endpoint object are customized according to our plugin code. Plugin typically need this information for communicating with endpoint

  • port - Gateway will listen on this port number. Clients (e.g. Provisioning Server) will be using this port number for communicating with the gateway. For endpoint the port is the port number used by plugin for communicating with SAP Hana.

  • localhostonly - true or false. False means gateway accepts incoming requests from all clients. True means traffic from only localhost (127.0.0.1) is accepted (gateway must then be installed on the CA Connector Server).

  • scim.version - "1.1" or "2.0". Default is "1.1". For Azure AD as IdP "2.0" should be used.

  • scim.customSchema - filename of JSON file located in <package-root>\config\schemas containing custom schema attributes, see configuration notes

  • scim.customUniqueAttrMapping - Option for replacing mandatory userName/displayName if IdP use other attributes

  • scim.customUniqueAttrMapping.userName - attribute replacing userName (User object)

  • scim.customUniqueAttrMapping.displayName - attribute replacing displayName (Group object)

  • log.loglevel.file - error, info or debug. Output to logfile logs\plugin-saphana.log

  • log.loglevel.console - error, info or debug. Output to stdout and errors to stderr.

  • log.customMasking - array of attributes to be masked e.g. "customMasking": ["SSN", "weight"]. By default SCIM Gateway includes masking of standard attributes like password.

  • auth - Contains one or more authentication/authorization methods used by clients for accessing gateway. Methods are disabled by setting corresponding attributes to null

  • auth.basic - Basic Authentication with username/password. Note, we set a clear text password and when gateway is started password will become encrypted and updated in the configuration file.

  • auth.bearer - Contains misc bearer token methods for authorization of client requests.

  • auth.bearer.token - Shared token/secret (supported by Azure). Clear text value will become encrypted when gateway is started.

  • auth.bearer.jwt - Contains misc JSON Web Token (JWT) methods for authorization.

  • auth.bearer.jwt.azure - JWT used by Azure SyncFabric. tenantIdGUID must be set to Azure Active Directory Tenant ID.

  • auth.bearer.jwt.standard - Standard JWT. Using secret or publicKey for signature verification. publicKey should be set to the filename of public key or certificate pem-file located in <package-root>\config\certs. Clear text secret will become encrypted when gateway is started. options.issuer is mandatory. Other options may also be included according to jsonwebtoken npm package definition.

  • certificate - If not using SSL/TLS certificate, set "key", "cert" and "ca" to null. When using SSL/TLS, "key" and "cert" have to be defined with the filename corresponding to the primary-key and public-certificate. Both files must be located in the <package-root>\config\certs directory e.g:

      "certificate": {
        "key": "key.pem",
        "cert": "cert.pem",
        "ca": null
      }  
    

    Example of how to make a self signed certificate:

      openssl req -nodes -newkey rsa:2048 -x509 -sha256 -days 3650 -keyout key.pem -out cert.pem -subj "/O=Testing/OU=SCIM Gateway/CN=<FQDN>" -config "<path>\openssl.cnf"
    

    <FQDN> is Fully Qualified Domain Name of the host having SCIM Gateway installed

    Note, when using Broadcom/CA Provisioning, the "certificate authority - CA" also have to be imported on the Connector Server. For self-signed certificate CA and the certificate (public key) is the same.

    PFX / PKCS#12 bundle can be used instead of key/cert/ca e.g:

      "pfx": {
        "bundle": "certbundle.pfx",
        "password": "password"
      }
    

    Note, we should normally use certificate (https) for communicating with SCIM Gateway unless we install ScimGatway locally on the manager (e.g. on the CA Connector Server). When installed on the manager, we could use http://localhost:port or http://127.0.0.1:port which will not be passed down to the data link layer for transmission. We could then also set {"localhostonly": true}

  • emailOnError - Contains configuration for sending error notifications by email. Note, only the first error will be sent until sendInterval have passed

  • emailOnError.smtp.enabled - true or false, value set to true will enable email notifications

  • emailOnError.smtp.host - Mailserver e.g. "smtp.office365.com"

  • emailOnError.smtp.port - Port used by mailserver e.g. 587, 25 or 465

  • emailOnError.smtp.proxy - If using mailproxy e.g. "http://proxy-host:1234"

  • emailOnError.smtp.authenticate - true or false, set to true will use username/password authentication

  • emailOnError.smtp.username - Mail account for authentication and also the sender of the email, e.g. "user@outlook.com"

  • emailOnError.smtp.password - Mail account password

  • emailOnError.smtp.sendInterval - Mail notifications on error are deferred until sendInterval minutes have passed since the last notification. Default 15 minutes

  • emailOnError.smtp.to - Comma separated list of recipients email addresses e.g: "someone@example.com"

  • emailOnError.smtp.cc - Comma separated list of cc email addresses

  • endpoint - Contains endpoint specific configuration according to our plugin code.

Configuration notes
  • Setting environment variable SEED will override default password seeding logic.

  • All configuration can be set based on environment variables. Syntax will then be "process.env.<ENVIRONMENT>" where <ENVIRONMENT> is the environment variable used. E.g. scimgateway.port could have value "process.env.PORT", then using environment variable PORT.

  • All configuration can be set based on corresponding JSON-content in external file using plugin name as parent JSON object (supports also dot notation). Syntax will then be "process.file.<path>" where <path> is the file used. E.g. endpoint.password could have value "process.file./var/run/vault/secrets.json"

    Example:

      {
        "scimgateway": {
          ...
          "port": "process.env.PORT",
      	...
      	"loglevel": {
      	  "file": "process.env.LOG_LEVEL_FILE",
      	  ...
      	  "auth": {
      	    "basic": {
      		  "username": "process.file./var/run/vault/secrets.json",
      		  "password": "process.file./var/run/vault/secrets.json",
      		  ...
        	},
      	"endpoint": {
      	  ...
      	  "username": "process.file./var/run/vault/secrets.json",
      	  "password": "process.file./var/run/vault/secrets.json",
      	  ...
      	}
      }  
    

    secrets.json for plugin-forwardinc - example #1:

      {
        "plugin-forwardinc": {
          "scimgateway": {
      	  "auth": {
      	    "basic": {
      	      "username": "gwadmin",
      	      "password": "password"
              } 
      	  }
          },
      	"endpoint": {
      	  "username": "superuser",
      	  "password": "secret"
      	}
        }
      }  
    

    secrets.json for plugin-forwardinc - example #2 (dot notation):

      {
        "plugin-forwardinc.scimgateway.auth.basic.username": "gwadmin",
        "plugin-forwardinc.scimgateway.auth.basic.password": "password",
        "plugin-forwardinc.endpoint.username": "superuser",
        "plugin-forwardinc.endpoint.password": "secret"
      }  
    
  • Custom schema attributes can be added by plugin configuration scim.customSchema having value set to filename of a JSON schema-file located in <package-root>/config/schemas e.g:

      "scim": {
        "version": "1.1",
        "customSchema": "plugin-forwardinc-schema.json"
      },
    

    JSON file have following syntax:

      [
        { 
          "name": "User",
          "attributes": [...]
        },
        { 
          "name": "Group",
          "attributes": [...]
        }
      ]
    

    Where array attributes contains custom attribute objects according to SCIM 1.1 or 2.0 spesification e.g:

      "attributes": [
        {
          "name": "musicPreference",
      	"type": "string",
      	"multiValued": false,
      	"description": "Music Preferences",
      	"readOnly": false,
      	"required": false,
      	"caseExact": false
        },
        {
          "name": "populations",
      	"type": "complex",
      	"multiValued": true,
      	"multiValuedAttributeChildName": "population",
      	"description": "Population array",
      	"readOnly": false,
      	"required": false,
      	"caseExact": false,
      	"subAttributes": [
      	  {
      	    "name": "value",
      	    "type": "string",
      	    "multiValued": false,
      	    "description": "Population value",
      	    "readOnly": false,
      	    "required": true,
      	    "caseExact": false
      	  }
      	]
        }
      ]
    

    Note, custom schema attributes will be merged into core:1.0/2.0 schema, and names must not conflict with standard SCIM attribute names.

Manual startup

Gateway can now be started from a command window running in administrative mode

3 ways to start:

node c:\my-scimgateway

node c:\my-scimgateway\index.js

<package-root>node .

Ctrl+c to stop

Automatic startup - Windows Task Scheduler

Start Windows Task Scheduler (taskschd.msc), right click on "Task Scheduler Library" and choose "Create Task"

General tab:  
-----------
Name = SCIM Gateway
User account = SYSTEM
Run with highest privileges

Triggers tab:
-------------
Begin the task = At startup

Actions tab:
------------
Action = Start a program
Program/script = c:\Program Files\nodejs\node.exe
Arguments = c:\my-scimgateway

Settings - tab:
---------------
Stop the task if runs longer than = Disabled (greyed out)

Verification:

  • Right click task - Run, verify process node.exe (SCIM Gateway) can be found in the task manager (not the same as task scheduler). Also verify logfiles <pakage-root>\logs
  • Right click task - End, verify process node.exe have been terminated and disappeared from task manager
  • Reboot server and verify SCIM Gateway have been automatically started

Running as a isolated virtual Docker container

On Linux systems we may also run SCIM Gateway as a Docker image (using docker-compose)

  • Docker Pre-requisites:
    docker-ce
    docker-compose
  • Install SCIM Gateway within your own package and copy provided docker files:

      mkdir /opt/my-scimgateway  
      cd /opt/my-scimgateway  
      npm init -y  
      npm install scimgateway --save  
      cp ./config/docker/* .  
    

    docker-compose.yml <== Here is where you would set the exposed port and environment
    Dockerfile <== Main dockerfile
    DataDockerfile <== Handles volume mapping
    docker-compose-debug.yml <== Debugging

  • Create a scimgateway user on your Linux VM.

      adduser scimgateway
    
  • Create a directory on your VM host for the scimgateway configs:

      mkdir /home/scimgateway/config
    
  • Copy your updated configuration file e.g. /opt/my-scimgateway/config/plugin-loki.json to /home/scimgateway/config. Use scp to perform the copy.

    NOTE: /home/scimgateway/config is where all important configuration and loki datastore will reside outside of the running docker container. If you upgrade scimgateway you won't lose your configurations and data.

  • Build docker images and start it up

      docker-compose up --build -d
    

    NOTE: Add the -d flag to run the command above detached.

    Be sure to confirm that port 8880 is available with a simple http request

    If using default plugin-loki and we have configured {"persistence": true}, we could confirm scimgateway created loki.db:

      su scimgateway  
      cd /home/scimgateway/config  
      ls loki.db  
    

To list running containers information:
docker ps

To list available images:
docker images

To view the logs:
docker logs scimgateway

To execute command within your running container:
docker exec scimgateway <bash command>

To stop scimgateway:
docker-compose stop

To restart scimgateway:
docker-compose start

To debug running container (using Visual Studio Code):
docker-compose -f docker-compose.yml -f docker-compose-debug.yml up -d
Start Visual Studio Code and follow these debugging instructions

To upgrade scimgateway docker image (remove the old stuff before running docker-compose up --build):

docker rm scimgateway  
docker rm $(docker ps -a -q); docker rmi $(docker images -q -f "dangling=true")  

CA Identity Manager as IdP using SCIM Gateway

Using the Broadcom/CA Provisioning Manager we have to configure

Endpoint type = SCIM (DYN Endpoint)

SCIM endpoint configuration example for Loki plugin (plugin-loki)

Endpoint Name = Loki  
User Name = gwadmin  
Password = password  
SCIM Authentication Method = HTTP Basic Authentication  
SCIM Based URL = http://localhost:8880  

or:  

SCIM Based URL = http://localhost:8880/<baseEntity>

Username, password and port must correspond with plugin configuration file. For "Loki" plugin it will be config\plugin-loki.json

"SCIM Based URL" refer to the FQDN (or localhost) having SCIM Gateway installed. Portnumber must be included. Use HTTPS instead of HTTP if SCIM Gateway configuration includes certificates.

"baseEntity" is optional. This is a parameter used for multi tenant or multi endpoint solutions. We could create several endpoints having same base url with unique baseEntity. e.g:

http://localhost:8880/clientA
http://localhost:8880/clientB

Each baseEntity should then be defined in the plugin configuration file with custom attributes needed. Please see examples in plugin-forwardinc.json

IM 12.6 SP7 (and above) also supports pagination for SCIM endpoint (data transferred in bulks - endpoint explore of users). Loki plugin supports pagination. Other plugin may ignore this setting.

SCIM Gateway REST API

Create = POST http://example.com:8880/Users  
(body contains the user information)

Update = PATCH http://example.com:8880/Users/<id>
(body contains the attributes to be updated)

Search/Read = GET http://example.com:8880/Users?userName eq 
"userID"&attributes=<comma separated list of scim-schema defined attributes>

Search/explore all users:
GET http://example.com:8880/Users?attributes=userName

Delete = DELETE http://example.com:8880/Users/<id>

Discovery:

GET http://example.com:8880/ServiceProviderConfigs
Specification compliance, authentication schemes, data models.

GET http://example.com:8880/Schemas
Introspect resources and attribute extensions.

Note:

  • userName (mandatory) = UserID
  • id (mandatory) = Unique id. Could be set to the same as UserID but don't have to.

SAP Hana endpoint

Get all users (explore):  
select USER_NAME from SYS.USERS where IS_SAML_ENABLED like 'TRUE';

Get a specific user:  
select USER_NAME, USER_DEACTIVATED from SYS.USERS where USER_NAME like '<UserID>';

Create User:  
CREATE USER <UserID> WITH IDENTITY '<UserID>' FOR SAML PROVIDER <SamlProvider>;

Delete user:  
DROP USER <UserID>;

Modify user (enable user):  
ALTER USER <UserID> ACTIVATE;

Modify user (disable user):  
ALTER USER <UserID> DEACTIVATE;  

Postinstallation:

cd c:\my-scimgateway
npm install hdb --save  

Only SAML users will be explored and managed

Supported template attributes:

  • User Name (UserID)
  • Suspended (Enabled/Disabled)

Currently no other attributes needed. Trying to update other attributes will then give an error message. The SCIM Provisioning template should therefore not include any other global user attribute references.

SAP Hana converts UserID to uppercase. Provisioning use default lowercase. Provisioning template should therefore also convert to uppercase.

User Name = %$$TOUPPER(%AC%)%

Azure Active Directory endpoint

Using plugin-azure-ad we could do user provisioning towards Azure AD including license management e.g. O365

For testing purposes we could get an Azure free account and in addition the free Office 365 for testing license management through Azure.

Azure AD prerequisites

  • Logon to Azure as global administrator
  • Azure Active Directory - properties
    • Copy "Directory ID"
    • or Azure Active Directory - Custom domain names (copy primary domain name)
  • Azure Active Directory - App registrations - New application registration
    • Name = newApp
    • Application type = Web app API
    • Sign-on URL = http://localhost (not used)
    • Click "Create"
  • Click "newApp"
    • Copy "Application ID"
    • Required permissions - Windows Azure Active Directory
      • Enable "APPLICATION PERMISSIONS" (all application sub categories enabled)
      • Click "Save"
    • Keys
      • Key description = Key1
      • Duration = Never expires
      • Click "Save"
      • Copy Key1 "value"" (client secret)

Application needs to be member of "User Account Administrator" when running behalf of application rather than user

  • Start Powershell command window
  • Install the Azure AD Module (if not already installed)
    • Install-Module MSOnline
  • Import-Module MSOnline
  • Connect-MsolService (logon as a user having "Global administrator" role)
  • Get-MsolServicePrincipal -AppPrincipalId {Application ID}
    • Copy ObjectId
  • List all roles and find "User Account Administrator"
    • Get-MsolRole
  • List current members of this role:
    • Get-MsOlRoleMember -RoleObjectId fe930be7-5e62-47db-91af-98c3a49a38b1
  • Add application to "User Account Administrator" role:
    • Add-MsolRoleMember -RoleName "User Account Administrator" -RoleMemberType ServicePrincipal -RoleMemberObjectId {ObjectIdOfServicePrincipal}
  • Verify:
    • Get-MsOlRoleMember -RoleObjectId fe930be7-5e62-47db-91af-98c3a49a38b1

Edit index.js
Uncomment startup of plugin-azure-ad, other plugins could be comment out if not needed

const azureAD = require('./lib/plugin-azure-ad')

Edit plugin-azure-ad.json

Username and password used to connect the SCIM Gateway must be defined.

Update tenantIdGUID, clientID and clientSecret according to Azure AD prerequisites configuration.

If using proxy, set proxy.host to "http://<FQDN-ProxyHost>:<port>" e.g "http://proxy.mycompany.com:3128"

"endpoint": {
  "entity": {
    "undefined": {
      "tenantIdGUID": "DomainName or DirectoryID (GUID)",
      "clientId": "Application ID",
      "clientSecret": "Generated application key value",
      "proxy": {
        "host": null,
        "username": null,
        "password": null
      }
    }
  }
}

Note, clientSecret and any proxy.password will become encrypted in this file on the first Azure connection.

For multi-tenant or multi-endpoint support, we may add several entities:

"endpoint": {
  "entity": {
    "undefined": {
		...
    }
    "clientA": {
		...
    }
    "clientB": {
		...
    }
  }
}

For additional details, see baseEntity description.

Note, we should normally use certificate (https) for communicating with SCIM Gateway unless we install gateway locally on the manager (e.g. on the CA Connector Server). When installed on the manager, we could use http://localhost:port or http://127.0.0.1:port which will not be passed down to the data link layer for transmission. We could then also set {"localhostonly": true}

For Broadcom/CA Provisioning, create endpoint type "Azure - ScimGateway"

  • Start SCIM Gateway
    • "const azureAD" must be uncomment in index.js
    • username, password and port defined in plugin-azure-ad.json must also be known
  • Start ConnectorXpress
  • Setup Data Sources
    • Add
    • Layer7 (this is SCIM)
    • Name = SCIM Gateway-8881
    • Base URL = http://localhost:8881 (SCIM Gateway installed locally on Connector Server)
  • Add the new "Azure - ScimGateway" endpoint type
    • Metadata - Import - "my-scimgateway\node_modules\scimgateway\config\resources\Azure - ScimGateway.xml"
    • Select the datasource we created - SCIM Gateway-8881
    • Enter password for the user defined in datasource (e.g. gwadmin/password)
    • On the right - expand Provisioning Servers - your server - and logon
    • Right Click "Endpoint Types", Create New Endpoint Type
      • You may use default name "Azure - ScimGateway" and click "OK" to create endpoint

Note, metafile "Azure - ScimGateway.xml" is based on CA "Azure - WSL7" with some minor adjustments like using Microsoft Graph API attributes instead of Azure AD Graph attributes.

Using the Broadcom/CA Provisioning Manager we have to configure

Endpoint type = Azure - ScimGateway (DYN Endpoint)

Endpoint configuration example:

Endpoint Name = Azure-AD-8881  
User Name = gwadmin  
Password = password  
SCIM Authentication Method = HTTP Basic Authentication  
SCIM Based URL = http://localhost:8881  
or  
SCIM Based URL = http://localhost:8881/<baseEntity>  

For details, please see section "CA Identity Manager as IdP using SCIM Gateway"

Azure Active Directory as IdP using SCIM Gateway

Azure AD could do automatic user provisioning by synchronizing users towards SCIM Gateway, and gateway plugins will update endpoints.

Plugin configuration file must include SCIM Version "2.0" (scimgateway.scim.version) and either Bearer Token (scimgateway.auth.bearer.token) or Azure Tenant ID GUID (scimgateway.auth.bearer.jwt.azure.tenantIdGUID) or both:

scimgateway: {
  "scim": {
    "version": "2.0",
    ...
  },
  ...
  "auth": {
    ...
    "bearer": {
      "token": "shared-secret",
      "jwt": {
        "azure": {
          "tenantIdGUID": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
        }
      ...
    }
    ...
  }
  ...
}

bearer.token configuration must correspond with "Secret Token" defined in Azure AD
tenantIdGUID configuration must correspond with Azure Active Directory Tenant ID

In Azure Portal: Azure-Azure Active Directory-Enterprise Application-<My Application>-Provisioning-Secret Token
Note, when "Secret Token" is left blank, Azure will use JWT (tenantIdGUID)

Azure-Azure Active Directory-Properties-Directory ID

User mappings attributes between AD and SCIM also needs to be configured

Azure-Azure Active Directory-Enterprise Application-<My Application>-Provisioning-Mappings

Azure AD default SCIM attribute mapping for USER have:

externalId mapped to mailNickname (matching precedence #1)  
userName mapped to userPrincipalName  

SCIM Gateway accepts externalId (as matching precedence) instead of userName, but userName and externalId must be mapped to the same AD attribute e.g:

externalId mapped to mailNickname (matching precedence #1)  
userName mapped to mailNickname  

or:  

externalId mapped to userPrincipalName (matching precedence #1)  
userName mapped to userPrincipalName  

Azure AD default SCIM attribute mapping for GROUP have:

externalId mapped to displayName (matching precedence #1)  
displayName mapped to mailNickname  

SCIM Gateway accepts externalId (as matching precedence) instead of displayName, but displayName and externalId must then be mapped to the same AD attribute e.g:

externalId mapped to displayName (matching precedence #1)
displayName mapped to displayName

Some notes related to Azure AD:

  • Azure Active Directory SCIM documentation

  • Use the "old Portal" for adding/creating your SCIM application. Adding an application using the "new Portal" will not give an OAuth/JWT compatible app - only bearer token (Secret Token) will be used. After the app have been registered (passing the "Test phase"), we could start using the "new Portal"

  • Azure AD do a regular check for a "none" existing user/group. This check seems to be a "keep alive" to verify connection.

  • Azure AD first checks if user/group exists, if not exist they will be created (no explore of all users like CA Identity Manager)

  • Deleting a user in Azure AD sends a modify user {"active":"False"} which means user should be disabled. This logic is configured in attribute mappings. Standard SCIM "DELETE" method seems not to be used.

API Gateway

Gateway also works as an API Gateway when using url /api or /<baseEntity>/api

Following methods for the none SCIM based api-plugin are supported:

	GET /api  
	GET /api?queries  
	GET /api/{id}  
	POST /api + body  
	PUT /api/{id} + body  
	PATCH /api/{id} + body  
	DELETE /api/{id}  

Please see example plugin: plugin-api.js

How to build your own plugins

For JavaScript coding editor you may use Visual Studio Code

Preparation:

  • Copy "best matching" example plugin e.g. lib\plugin-loki.js and config\plugin-loki.json and rename both copies to your plugin name prefix e.g. plugin-mine.js and plugin-mine.json (for SOAP Webservice endpoint we might use plugin-forwardinc as a template)
  • Edit plugin-mine.json and define a unique port number for the gateway setting
  • Edit index.js and add a new line for starting your plugin e.g. let mine = require('./lib/plugin-mine');
  • Start SCIM Gateway and verify. If using CA Provisioning you could setup a SCIM endpoint using the port number you defined

Now we are ready for custom coding by editing plugin-mine.js Coding should be done step by step and each step should be verified and tested before starting the next (they are all highlighted by comments in existing code).

  1. Turn off group functionality in getGroup, getGroupMembers, getGroupUsers and modifyGroupMembers
    Please see callback definitions in plugin-saphana that do not use groups.
  2. exploreUsers (test provisioning explore users)
  3. getUser (test provisioning retrieve account)
  4. createUser (test provisioning new account)
  5. deleteUser (test provisioning delete account)
  6. modifyUser (test provisioning modify account)
  7. exploreGroups (test provisioning explore groups)
  8. Turn on group functionality (if supporting groups)
  9. getGroup (test provisioning group list groups)
  10. getGroupMembers (test provisioning retrieve account - group list groups)
  11. modifyGroupMembers (test provisioning retrieve account - group add/remove groups)
  12. getGroupUsers (if using "groups member of user")
  13. createGroup (test provisioning new group)

Template used by CA Provisioning role should only include endpoint supported attributes defined in our plugin. Template should therefore have no links to global user for none supported attributes (e.g. remove %UT% from "Job Title" if our endpoint/code do not support title)

CA Provisioning using default SCIM endpoint do not support SCIM Enterprise User Schema Extension (having attributes like employeeNumber, costCenter, organization, division, department and manager). If we need these or other attributes not found in CA Provisioning, we could define our own by using the free-text "type" definition in the multivalue entitlements or roles attribute. In the template entitlements definition, we could for example define type=Company and set value to %UCOMP%. Please see plugin-forwardinc.js using Company as a multivalue "type" definition.

Using CA Connector Xpress we could create a new SCIM endpoint type based on the original SCIM. We could then add/remove attributes and change from default assign "user to groups" to assign "groups to user". There are also other predefined endpoints based on the original SCIM. You may take a look at "ServiceNow - WSL7" and "Zendesk - WSL7".

For project setup:

  • Datasource = Layer7 (CA API) - this is SCIM
  • Layer7 Base URL = SCIM Gateway url and port (SCIM Base URL)
  • Authentication = Basic Authentication
    (connect using gwadmin/password defined in plugin config-file)

How to change "user member of groups" to "groups member of user"

Using Connector Xpress based on the original SCIM endpoint.

Delete defaults:
Group - Associations - with User Account
User Account - Attributes - Group Membership

Create new attribute:
User Account - Attributes: Groups - Flexi DN - Multivalue - groups

Create User - Group associations:
User Account - Accociations - Direct association with = Group
User Account - Accociations - with Group

Note, "Include a Reverse Association" - not needed if we don't need Group object functionality e.g list/add/remove group members

User Attribute = Physical Attribute = Groups
Match Group = By Attribute = Name

Objects Must Exist
Use DNs in Attribute = deactivated (toggled off)

Include a Reverse Association (if needed)
Group Attribute = Virtual Attribute = User Membership
Match User Account = By Attribute = User Name

Note, groups should be capability attribute (updated when account is synchronized with template):
advanced options - Synchronized = enabled (toggled on)

Methods

Plugins should have following initialization:

// mandatory plugin initialization - start
const path = require('path')
let ScimGateway = null
try {
  ScimGateway = require('scimgateway')
} catch (err) {
  ScimGateway = require('./scimgateway')
}
let scimgateway = new ScimGateway()
let pluginName = path.basename(__filename, '.js')
let configDir = path.join(__dirname, '..', 'config')
let configFile = path.join(`${configDir}`, `${pluginName}.json`)
let config = require(configFile).endpoint
let validScimAttr = [] // empty array - all attrbutes are supported by endpoint
// add any external config process.env and process.file
config = scimgateway.processExtConfig(pluginName, config)
// mandatory plugin initialization - end

exploreUsers

scimgateway.exploreUsers = async (baseEntity, attributes, startIndex, count) => {
    let ret = {
        "Resources": [],
        "totalResults": null
    }
	...
	return ret
}  
  • baseEntity = Optional for multi-tenant or multi-endpoint support (defined in base url e.g. <baseurl>/client1 gives baseEntity=client1)
  • startIndex = Pagination - The 1-based index of the first result in the current set of search results
  • count = Pagination - Number of elements to be returned in the current set of search results
  • ret:
    ret.Resources = array filled with objects containing userName and id (userName and id set to the same value) e.g [{"userName":"bjensen","id":"bjensen"}, "userName":"jsmith","id":"jsmith"}]
    ret.totalResults = if supporting pagination, then attribute should be set to the total numbers of elements (users) at the endpoint, else set to null

exploreGroups

scimgateway.exploreGroups = async (baseEntity, attributes, startIndex, count) => {
    let ret = {
        "Resources": [],
        "totalResults": null
    }
	...
	return ret
}  
  • ret:
    ret.Resources = array filled with objects containing group displayName and id (displayName and id set to the same value) e.g [{"displayName":"Admins","id":"Admins"}, "displayName":"Employees","id":"Employees"}]
    ret.totalResults = if supporting pagination attribute should be set to the total numbers of elements (groups) at the endpoint else set to null

getUser

scimgateway.getUser = async (baseEntity, userName, attributes) => {
	...
	return userObj
}  
  • userName = user id (eg. bjensen)
  • attributes = scim attributes to be returned. If no attributes defined, all should be returned.
  • return userObj: userObj containing scim userattributes/values eg:
    {"id":"bjensen","name":{"formatted":"Ms. Barbara J Jensen III","familyName":"Jensen","givenName":"Barbara"}}

Note, CA Provisioning use two types of "getUser"

  1. Check if user exist: attributes=userName and/or id
  2. Retrive user: attributes=list of all attributes

createUser

scimgateway.createUser = async (baseEntity, userObj) => {
	...
	return null
} 
  • userObj = user object containing userattributes according to scim standard
    Note, multi-value attributes excluding user attribute 'groups' are customized from array to object based on type
  • return null: null if OK, else throw error

deleteUser

scimgateway.deleteUser = async (baseEntity, id) => {
	...
	return null
} 
  • id = user id to be deleted
  • return null: null if OK, else throw error

modifyUser

scimgateway.modifyUser = async (baseEntity, id, attrObj) => {
	...
	return null
} 
  • id = user id
  • attrObj = object containing userattributes to be modified according to scim standard
    Note, multi-value attributes excluding user attribute 'groups' are customized from array to object based on type
  • return null: null if OK, else throw error

getGroup

scimgateway.getGroup = async (baseEntity, displayName, attributes) => {
	...
	return retObj
} 
  • displayName = group name

  • attributes = scim attributes to be returned in callback (displayName and members is mandatory)

  • return retObj: retObj containing group displayName and id (+ members if using default "users are member of group")

    eg. using default "users are member of group":
    {"displayName":"Admins","id":"Admins","members":[{"value":"bjensen","display":"bjensen"]}

    eg. using "groups are member of user":
    {"displayName":"Admins","id":"Admins"}

    If we do not support groups, callback(null, null)

getGroupMembers

scimgateway.getGroupMembers = async (baseEntity, id, attributes) => {
    let arrRet = []
	...
	return arrRet
}

Retrieve all users for a spesific group WHEN "user member of group". This setting is CA IM default scim endpoint configuration. This means Group having multivalue attribute members containing userName.

  • id = user id (eg. bjensen)

  • attributes = attributes to be returned in callback (we only return the name of groups - displayName and current user as member)

  • startIndex = Pagination - The 1-based index of the first result in the current set of search results

  • count = Pagination - Number of elements to be returned in the current set of search results

  • return ret:
    ret.Resources = array to be filled with objects containing groups with current user as member
    e.g [{"displayName":"Admins","members": [{ "value": bjensen}]}, {"displayName":"Employees", "members": [{ "value": bjensen}]}]

    ret.totalResults = if supporting pagination attribute should be set to the total numbers of elements (group members) at the endpoint else set to null

    If we do not support groups (or "user member of group"), callback(null, [])

getGroupUsers

scimgateway.getGroupUsers = async (baseEntity, groupName, attributes) => {
	let arrRet = []
	...
	return arrRet
}

Retrieve all users for a spesific group WHEN "group member of user". This means user having multivalue attribute groups containing value GroupName

  • groupName = group name (eg. UserGroup-1)

  • attributes = scim attributes to be returned in callback

  • return arrRet: arrRet = array containing the userName's' e.g: [{"userName", "bjensen"}, {"userName", "jsmith"}]

    If we do not support groups (or "group member of user"), then return []

createGroup

scimgateway.createGroup = async (baseEntity, groupObj) => {
	...
    return null
})
  • groupObj = group object containing groupattributes according to scim standard
    groupObj.displayName contains the group name to be created
  • return null: null if OK, else throw error

deleteGroup

scimgateway.deleteGroup = async (baseEntity, id) => {
	...
    return null
}
  • id = group name (eg. Admins) to be deleted
  • return null: null if OK, else throw error

modifyGroupMembers

scimgateway.modifyGroupMembers = async (baseEntity, id, members) => {
	...
    return null
}
  • id = group name (eg. Admins)
  • members = array of objects containing groupmembers modifications
    eg: {"value":"bjensen"},{"operation":"delete","value":"jsmith"}
    (adding bjensen and deliting jsmith from group)
  • return null: null if OK, else throw error
    If we do not support groups, then return null

Known limitations

  • Installation gives error messages related to the module soap optional dependency to 'ursa' that also includes 'node-gyp'. These error messages can be ignored unless soap WSSecurityCert functionality is needed in custom plugin code.

  • Importing "certificate authority - CA" on the CA Connector Server gives a "Failure" message. After restarting the connector it will show certificate have been installed and HTTPS communication works fine.

License

MIT © Jarle Elshaug

Change log

v2.1.12

[Fixed]

  • Plugin configuration referring to an external configuration file having array did not work.

v2.1.11

[Fixed]

  • Log masking of xml (SOAP) messages.

v2.1.10

[Added]

  • Log masking of custom defined attributes.
    customMasking may include an array of attributes to be masked
    e.g. "customMasking": ["SSN", "weight"]

  • Note, configurationfiles must be changed (old syntax still supported)
    old syntax:

      "loglevel": {
        "file": "debug",
        "console": "error"
      },
    

    new syntax:

      "log": {
        "loglevel": {
          "file": "debug",
          "console": "error"
        },
        "customMasking": []
      },
    

    By default SCIM Gateway includes masking of standard attributes like password

v2.1.9

[Fixed]

  • AAD as IdP broken after content-type validation introduced in v2.1.7
  • AAD as IdP, none gallery app support
  • Incorrect SCIM 2.0 multivalue converting
  • plugin-saphana not correctly ported to v2.x

Thanks to Luca Moretto

v2.1.8

[Fixed]

  • plugin-mssql not correctly ported to v2.x, and some config syntax for this plugin have also changed in newer releases of dependencies.

v2.1.7

[Fixed]

  • Validates content-type when body is included
  • Case insensitive log-masking
  • Plugins now don't using deprecated url.parse
  • Misc cosmetics e.g. using const instead of let when not reassigned

v2.1.6

[Fixed]

  • plugin-azure-ad did not return correct error code (err.name = 'DuplicateKeyError') when failing on creating a duplicate user

[Added]

  • Includes latest versions of module dependencies

v2.1.4

[Fixed]

  • Incorrect SCIM 2.0 error handling after v2.1.0
  • For duplicate key error, setting err.name = 'DuplicateKeyError' now gives correct status code 409 instead of defult 500 (see plugin-loki.js)

v2.1.3

[Fixed]

  • Standardized the API Gateway response (not SCIM related)
  • Not allowing plugins to return password
  • Colorize option now automatically turned off when using stdout/stderr redirect (configuration file loglevel.colorize is not needed)

v2.1.2

[Fixed]

  • SCIM 2.0 may use Operations.value as array and none array (issue #16)

[Added]

  • Option for replacing mandatory userName/displayName attribute by configuring customUniqueAttrMapping
  • Includes latest versions of module dependencies

v2.1.1

[Fixed]

  • SCIM 2.0 may use Operations.value or Operation.value[] for PATCH syntax of the name object (issue #14)
  • plugin-loki failed to modify a none existing object, e.g name object not included in Create User

v2.1.0

[Added]

  • Custom schema attributes can be added by plugin configuration scim.customSchema having value set to filename of a JSON schema-file located in <package-root>/config/schemas

[UPGRADE]

  • Configurationfiles for custom plugins should be changed
    old syntax:

      "scimversion": "1.1",  
    

    new syntax:

      "scim": {
        "version": "1.1",
        "customSchema": null
      },
    

Note, "1.1" is default, if using "2.0" the new syntax must be used.

v2.0.2

[Fixed]

  • SCIM 2.0 incorrect response for user not found
  • Did not mask logentries ending with newline

v2.0.0

[MAJOR]

  • Codebase moved from callback to async/await
  • Koa replacing Express
  • Some log enhancements
  • Deprecated cipher methods have been replaced
  • Plugin restful (REST) and forwardinc (SOAP) includes failover logic based on endpoints defined in array baseUrls/baseServiceEndpoints.

[UPGRADE]

Note, this is a major upgrade (^1.x.x => ^2.x.x) and will brake compatibility with any existing custom plugins. To force a major upgrade, suffix @latest must be include in the npm install command, but it's recommended to do a fresh install and copy any custom plugins instead of upgrading an existing package

cd c:\my-scimgateway
npm install scimgateway@latest

Custom plugins needs some changes (please see included example plugins)

  • scimgateway.on(xxx, function (..., callback) replaced with scimgateway.xxx = async (...) returning a result or throwing an error
  • Rest and SOAP using doRequest method having endpoint failover logic through array baseUrls/baseServiceEndpoints defined in corresponding plugin configuration file.
  • Additional argument attributes included in exploreUsers and exploreGroups method
  • Proxy configuration includes option for user/password
  • Encrypted passwords in configuration files needs to be reset to clear text passwords

v1.0.20

[Fixed]

  • HTTP status code 200 and totalResults set to value of 0 when using SCIM 2.0 filter user/group and no resulted user/group found. SCIM 1.1 still using status code 404.

[UPGRADE]

  • For custom plugins to be compliant with SCIM 2.0, the getUser and getGroup methods needs to be updated. If user/group not found then return callback(null, null) instead of callback(err)

v1.0.19

[Fixed]

  • Fix related to external configuration (ref. v1.0.18) when running multiple plugins

v1.0.18

[Added]

  • Includes latest versions of module dependencies
  • Loglevel configuration for file and console now separated
  • Loglevel colorize option (value false could be useful when redirecting console output)
  • All configuration can be set based on environment variables
  • All configuration can be set based on correspondig json-content in external file (supports also dot notation)

[UPGRADE]

  • Configurationfiles for custom plugins should be changed
    old syntax:

      loglevel: "debug"
    

    new syntax:

      "loglevel": {
        "file": "debug",
        "console": "error",
        "colorize": true
      }
    

v1.0.14

[Fixed]

  • Some multiValued attributes not correctly handled (e.g. addresses)

v1.0.13

[Fixed]

  • plugin-azure-ad: New version of "Azure - ScimGateway.xml" fixing CA IM RoleDefGenerator problem (related to creating and importing screens in CA IM)

[UPGRADE]

  • Use CA ConnectorXpress, import "Azure - ScimGateway.xml" and deploy/redeploy endpoint

v1.0.12

[Fixed]

  • Incorrect logging of Express stream messages (type info) when running multiple plugins

v1.0.11

[Fixed]

  • plugin-azure-ad: proxy configuration did not work

v1.0.10

[Fixed]

  • An issue with pagination fixed

v1.0.9

[Added]

  • Cosmetics, changed emailOnError logic - now emitted by logger

v1.0.8

[Added]

  • Support health monitoring using the "/ping" URL with a "hello" response, e.g. http://localhost:8880/ping. Useful for frontend load balancing/failover functionality
  • Option for error notifications by email

[UPGRADE]

  • Configuration files for custom plugins must include the emailOnError object for enabling error notifications by email. Please see the syntax in provided example plugins and details described in the "Configuration" section of this document.

v1.0.7

[Added]

  • Docker now using node v.9.10.0 instead of v.6.9.2
  • Minor log cosmetics

v1.0.6

[Fixed]

  • Azure AD plugin, failed to create user when licenses (app Service plans) was included

v1.0.5

[Added]

  • Supporting GET /Users, GET /Groups, PUT method and delete groups
  • After more than 3 invalid auth attempts, response will be delayed to prevent brute force

[Fixed]

  • Some minor compliance fixes

Thanks to ywchuang

v1.0.4

[Added]

  • Plugin for Azure AD now supports paging for retrieving users and groups. Any existing metafile used by CA ConnectorXpress ("Azure - ScimGateway.xml") must be re-deployed.

[Fixed]

  • Don't use deprecated existsSync in postinstallation

v1.0.3

[Fixed]

  • Undefined root url not handled correctly after v1.0.0

v1.0.2

[Fixed]

  • License and group defined as capability attributes in metafile used by CA ConnectorXpress regarding plugin-azure-ad

v1.0.1

[Fixed]

  • Mocha test script did not terminate after upgrading from 3.x to 4.x of Mocha

v1.0.0

[Added]

  • New plugin-azure-ad.js for Azure AD user provisioning including Azure license management e.g. Office 365
  • Includes latest versions of module dependencies
  • Module hdb (for SapHana) and saml is not included by default anymore and therefore have to be manually installed if needed.

[UPGRADE]
Method getGroupMembers must be updated for all custom plugins

Replace:

scimgateway.on('getGroupMembers', function (baseEntity, id, attributes, startIndex, count, callback) {
...
let ret = {
'Resources' : [],
'totalResults' : null
}
...
ret.Resources.push(userGroup)
...
callback(null, ret)

With:

scimgateway.on('getGroupMembers', function (baseEntity ,id ,attributes, callback) {
...
let arrRet = []
...
arrRet.push(userGroup)
...
callback(null, arrRet)

v0.5.3

[Added]

  • Includes api gateway/plugin for general none provisioning
    • GET /api
    • GET /api?queries
    • GET /api/{id}
    • POST /api + body
    • PUT /api/{id} + body
    • PATCH /api/{id} + body
    • DELETE /api/{id}
  • plugin-api.js demonstrates api functionallity (becomes what you want it to become)

v0.5.2

[Added]

  • One or more of following authentication/authorization methods are accepted:
    • Basic Authentication
    • Bearer token - shared secret
    • Bearer token - Standard JSON Web Token (JWT)
    • Bearer token - Azure JSON Web Token (JWT)

[UPGRADE]

  • Configuration files for custom plugins config/plugin-xxx.json needs to be updated regarding the new scimgateway.auth section:
    • Copy scimgateway.auth section from one of the example plugins
    • Copy existing scimgateway.username value to new auth.basic.username value
    • Copy existing scimgateway.password value to new auth.basic.username value
    • Copy existing scimgateway.oauth.accesstoken value to new auth.bearer.token value
    • Delete scimgateway.username
    • Delete scimgateway.password
    • Delete scimgateway.oauth

v0.4.6

[Added]

  • Document updated on how to run SCIM Gateway as a Docker container
  • config\docker includes docker configuration examples
    Thanks to Charley Watson and Jeffrey Gilbert

v0.4.5

[Added]

  • Environment variable SEED overrides default password seeding
  • Setting SCIM Gateway port to "process.env.XXX" lets environment variable XXX define the port
  • Don't validate config-file port number for numeric value (Azure AD - iisnode using a name pipe for communication)

[UPGRADE]

  • Configuration files for custom plugins config/plugin-xxx.json needs to be updated:
    • Encrypted passwords needs to be reset to clear text passwords
    • Start SCIM Gateway and passwords will become encrypted

v0.4.4

[Added]

  • NoSQL Document-Oriented Database plugin: plugin-loki
    This plugin now replace previous plugin-testmode
    Thanks to Jeffrey Gilbert
  • Minor code/comment reorganizations in provided plugins
  • Minor adjustments to multi-value logic introduced in v0.4.0

[UPGRADE]

  • Delete depricated lib/plugin-testmode.js and config/plugin-testmode.json
  • Edit index.js, replace tesmode with loki

v0.4.2

[Fixed]

  • plugin-restful minor adjustments to multivalue and cleared attributes logic introduced in v0.4.0

v0.4.1

[Added]

  • Mocha test scripts for automated testing of plugin-testmode

  • Automated tests run on Travis-ci.org (click on build badge)

  • Thanks to Jeffrey Gilbert

[Fixed]

  • Minor adjustments to multi-value logic introduced in v0.4.0

v0.4.0

[Added]

  • Not using the SCIM standard for handling multivalue attributes and cleared attributes. Changed from array to object based on type. This simplifies plugin-coding for multivalue attributes like emails, phoneNumbers, entitlements, ...
  • Module dependencies updated to latest versions

[UPGRADE]

  • Custom plugins using multivalue attributes needs to be updated regarding methods createUser and modifyUser. Please see example plugins for details.

v0.3.8

[Fixed]

  • Minor changes related to SCIM specification

v0.3.7

[Added]

  • PFX / PKCS#12 certificate bundle is supported

v0.3.6

[Added]

  • SCIM Gateway used by Microsoft Azure Active Directory is supported
  • SCIM version 2.0 is supported
  • Create group is supported

[UPGRADE]

  • For custom plugins to support create group, they needs to be updated regarding listener method scimgateway.on('createGroup',... Please see example plugins for details.

v0.3.5

[Fixed]

  • plugin-mssql not included in postinstall

v0.3.4

[Added]

  • MSSQL example plugin: plugin-mssql
  • Changed multivalue logic in example plugins, now using scimgateway.getArrayObject

[Fixed]

  • Minor changes related to SCIM specification

v0.3.3

[Fixed]

  • Logic for handling incorrect pagination request to avoid endless loop conditions (there is a pagination bug in CA Identity Manager v.14)
  • Pagination now supported on getGroupMembers

[UPGRADE]

  • Custom plugins needs to be updated regarding listener method scimgateway.on('getGroupMembers',... New arguments have been added "startIndex" and "count". Also a new return variable "ret". Please see example plugins for details.

v0.3.2

[Fixed]

  • Minor changes related to SCIM specification

v0.3.1

[Added]

  • REST Webservices example plugin: plugin-restful

v0.3.0

[Added]

  • Preferred installation method changed from "global" to "local"
  • <Base URL>/[baseEntity] for multi tenant or multi endpoint flexibility
  • plugin-forwardinc includes examples of baseEntity, custom soap header and signed saml assertion
  • Support groups defined on user object "group member of user"
  • New module dependendcies included: saml, async and callsite

[UPGRADE]

  • Use "fresh" install and restore any custom plugins. Custom plugins needs to be updated. Listener method names have changed and method must include "baseEntity" - please see example plugins.

v0.2.2 - v0.2.8

[Doc]

  • Minor readme changes and version bumps

v0.2.1

[Fixed]

  • plugin-forwardinc explore of empty endpoint

v0.2.0

Initial version

Keywords

FAQs

Package last updated on 07 Feb 2020

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc