Skip to content

Commit

Permalink
Update Rule “use-scim-for-identity-management/rule”
Browse files Browse the repository at this point in the history
  • Loading branch information
leahy268 committed Dec 14, 2023
1 parent fb63fe5 commit 1ed7c1c
Show file tree
Hide file tree
Showing 3 changed files with 2 additions and 2 deletions.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
4 changes: 2 additions & 2 deletions rules/use-scim-for-identity-management/rule.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,12 +20,12 @@ Integrating SCIM with Azure Active Directory automates the process of managing u

Relying solely on manual identity management processes in Azure Active Directory without SCIM integration. This manual approach is inefficient, prone to errors, and can lead to security risks due to inconsistent identity data across applications.

![Placeholder for Bad Example Image](URL_TO_BAD_EXAMPLE_IMAGE)
![Bad Example - SysAdmins have to provision each user separately in 3rd party products](bad-example-no-scim.jpg)

### Good Example

Implementing SCIM to automate user provisioning and deprovisioning across various cloud services. This ensures consistent identity data, improves security, and reduces the administrative burden.

![Placeholder for Good Example Image](URL_TO_GOOD_EXAMPLE_IMAGE)
![Placeholder for Good Example Image](good-example-scim.jpg "Good Example: SysAdmins only provision into EntraId the SCIM provisioning service does the rest")

By integrating SCIM with Azure Active Directory, organizations can achieve a more streamlined, secure, and efficient approach to identity management across their cloud ecosystem.

0 comments on commit 1ed7c1c

Please sign in to comment.