Configure userstores for SCIM 2.0-Based Inbound Provisioning¶
When a user or a group is created with SCIM 2.0, there are set of mandatory claim values that need to be saved along with the user or group. Some of these values are as follows.
Unless your user store is a JDBC user store, you need to map how these values are stored in your user store. This mapping can be done using the claim mapping setup in WSO2 Identity Server. You can find Active directory specific claim configurations when you configure Active Directory user stores for inbound provisioning.
Now let's assume you have an AD userstore as the primary userstore and you have done the claim mappings for the SCIM attributes.
Now suppose you need to add a secondary userstore, OpenLDAP. In this scenario, claim mappings done for AD may not be the same for OpenLDAP attributes. Therefore, it should be possible to map the claim attributes to the secondary userstore as well. Follow the instructions given below to do this.
Configure claim mappings to use SCIM 2.0 for inbound provisioning¶
Log in to the WSO2 Identity Server and access the Management Console (
Navigate to Main > Identity > Claims > List. For more information on configuring claims, see Configure Claims. Click on either urn:ietf:params:scim:schemas:core:2.0:User or urn:ietf:params:scim:schemas:core:2.0 claim dialect (depending on which SCIM claim you need to update) and find the mapped local claim of the SCIM claim that you need to edit.
Once you find the Mapped Local Claim, select that claim under http://wso2.org/claims.
Click Edit and modify the Mapped Attribute field in the resulting page.
Here we have configured a claim attribute mapping for a primary userstore. If you have a secondary userstore, you need to add another mapping for those as well. To do that just click on Add Attribute Mappings and set the corresponding values for userstore domain name and mapped attribute.