Re: [scim] IETF 114 preliminary Agenda and call for other agenda requests

"Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com> Fri, 15 July 2022 01:32 UTC

Return-Path: <ncamwing@cisco.com>
X-Original-To: scim@ietfa.amsl.com
Delivered-To: scim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BEFFC16ECB1 for <scim@ietfa.amsl.com>; Thu, 14 Jul 2022 18:32:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.605
X-Spam-Level:
X-Spam-Status: No, score=-14.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=PFHsvuxn; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=hdUuuJjB
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 67Mi_i34fBO1 for <scim@ietfa.amsl.com>; Thu, 14 Jul 2022 18:32:36 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF989C15A72B for <scim@ietf.org>; Thu, 14 Jul 2022 18:32:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=91721; q=dns/txt; s=iport; t=1657848756; x=1659058356; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=RFsD9cS+axwz/siBtPX73gF+hNsGvpwzZax5Iuic+VU=; b=PFHsvuxnDDvLJPVpJaoJX/ha2M0quru4I4w6j8VoF8NlG9wkSc1vupja qqESSEBKt3lZmwZEAITpKmG4meO0AQlatNq1AL3Iecp2jkcpKgg3+2xRJ 9EmmFoXnd7WAJW4RhOjCq1kyt6zWgJ+fgX42kOP46prkwZQKLQGcXbtxa E=;
X-IPAS-Result: A0B2AQD2wtBimIkNJK1aHgEBCxIMggQLgSExKih/Alk6RYROg0wDhTCFC4MCA4ETj0GGE4E0gy6BLBSBEQNUAwgBAQENAQE2DAQBAYIogl0CFoR4AiU0CQ4BAgQBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBwQUAQEBAQEBAQEJFAcGDAUOECeFaA2GQgEBAQEDEggBAgYdAQEjCQsBDwIBBgIOAwMBAQEWCwEGAwICAjAUCQgCBAENBRQHB3yBWgQBAYIOVwMwAwEPkDSPOQGBPwKJajV6gTGBAYIIAQEGBASBNwGDVwMVgjgJgT2DFYMNYEwBAYMbgWOCMxcQHIINgRUnDBCBZkoHMD6BBQGBXAQYfwgGBAELAQYBCAEfEAkNCQgBgxc3gi6MRwWBMg0jhCcRiH0HOAMaLS8SgR9sAQgEBgcKBTAGAgwYFAQCExJTFgISBQcKGQ4UGyIXDA8DEgMPAQcCCRAIEhMSCAMCAwgDAgMbCwIDFgkOAx0IChgSEBICBBEaCwgDFj8JAgQOA0AIDgMRBAMPGAkSCBAEBgMyDCULAxQNAQYDBgIFBQEDIAMUAwUkBwMhDyYNDQQRCgcdAwMFJQMCAhsHAgIDAgYVBgICbDkIBAgEKyQPBQIHLwUELwIeBAUGEQgCFgIGBAUCBAQWAhAIAggnFwcNBhgbGQEFCVAQCSEcDhoKBgUGFQMhbQUKOw0CKDQ2PCwfGwpKSywrFgMEBAMCBgwOAwMiAhAoBjEDFQYpExQWBBMJKipTCQIDIoEBBiIBHZ0ZBAYQCkYLBgEBMAwbCQIEFBsDEQoFASACKwIOHggODyULBwMFIAMBAg4fBQQCIRkDjlGDJBEWCSSDIIoLhAmbYoExCoNRiSiBepR2BC2DdYFQinOXM3qWdyCCK4E5d4g4lC8rIAGEcgIEAgQFAg4BAQaBYUk5I3BwFTsqAYI9CQo+GQ9XRI0FCwELAgmBBAEOgj2CZId5AXUCAQEBNgIDAwEKAQEDCYw9AScEgT9dAQE
IronPort-PHdr: A9a23:XBLONBXrC74ne0Tlt2tNeciRGH7V8K36AWYlg6HPw5pCcaWmqpLlO kGXpfBgl0TAUoiT7fVYw/HXvKbtVS1lg96BvXkOfYYKW0oDjsMbzAAlCdSOXEv8KvOiZicmH cNEAVli+XzzMUVcFMvkIVPIpXjn5j8JERK5Pg1wdYzI
IronPort-Data: A9a23:T0qlQKJ4yC4xcHiyFE+RDJUlxSXFcZb7ZxGr2PjKsXjdYENS0TVVx mZNXG3TaPffamvxeo9+bInn8RlQvpLcxt5kHQQd+CA2RRqmiyZq6fd1j6vUF3nPRiEWZBs/t 63yUvGZcIZsCCW0Si6FatANl1EkvU2zbue6WbSs1hxZH1c+En9+0E47wIbVv6Yx6TSHK1LV0 T/Ni5W31G+Ng1aY5UpNtspvADs21BjDkGtwUm4WPJinj3eC/5UhN6/zEInqR5fOria4KcbhL wrL5OnREmo0ZH7BAPv9+lrwWhVirrI/oWFih1IOM5VOjCSuqQQv47sYBqoGdX1FigSOovxTk vIOmoSJHFJB0q3kwIzxUjFRFyV4eKZB4rKCfT60sNeYyAvNdH6EL/dGVR5te9ZGvL8sRzgVq pT0KxhVBvyHr+S9ybekS+9jrs8iN8LseogYvxmMyBmJXal+Gc6TEv2iCdlw1XAQpP5tL+niI JRATT9sSRbQc0dhEwJCYH45tL742iagG9FCk3qtrK8652GV4A1337zgGN/UccaNXsJbggCTo Weu13/yAxQyNdGDx3yC6H3ErsPGmyXqHrAVELm+++RChVyY3GsIDxMKE1C8pJGRkk6/X5RfN koI0isooaUq+UqnQ9/hXhH+q3mB1iPwQPJZF+k8rQqK0KeRv0CSB3MPSXhKb9lOWNIKqSICy 26UvOG5HyBVorykTk+x1O2z7hyqAH1ARYMdXhMsQQwA6tjlhYg8iBPTU9pueJJZaPWoR1kcJ BjX8UADa6UvYd0jjP7ipA+Z6964jt2YEFBqt1y/sneNtFsRWWKzW2C/BbE3B95pKIKUSDFtV 1BbxpDHt4ji4Xxx/RFhrc0EGLWvov2CKjCZ3RhkHoIq8HKm/HvLkWFsDNNWeRgB3iUsIGKBj KrvVeV5v8M70JyCNvQfXm5JI552pZUM7Py8PhwuUvJAY4JqaCiM9zx0aEib0gjFyRZxzvFlY svAIJ/9XR727JiLKhLrGI/xNpd2mUgDKZ/7HvgXMjz+i+PFPS7JIVv7GALXNbhRAFy4TPX9q oYDaJTiJ+R3W+zlaS6f6p8IMV0PNhAG6WPe9aRqmhq4ClM+QgkJUqaJqZt4ItANt/kFx4/go yDmMmcFmQWXrSOcc22iNCs8AI4DqL4i9xrXywR2Ywbxs5XiCK7yhJoim2wfJ+V8qbQ7kaIuH pHouayoW5xyd9gOwBxFBbGVkWCoXE/Dad6mV8Z9XAUCQg==
IronPort-HdrOrdr: A9a23:cvTL86/JxUO2X4zLbyBuk+Ftdb1zdoMgy1knxilNoENuHPBwxv rAoB1E73PJYW4qKQ0dcdDpAtjlfZquz+8L3WBxB8bvYOCCggqVxe5ZnPPfKlHbak/DH6tmpN pdmstFeZLN5DpB/L3HCWCDer5KqrTmgcOVbKXlvg1QpGpRGsZdBnJCe3+m+zpNNW977PQCZf +hz/sCgwDlVWUcb8y9CHVAdfPEvcf3mJXvZgNDLwI76SGV5AnYpoLSIly95FMzQjlPybAt/S zuiAri/JiutPm911v1y3LT1ZJLg9Hso+EzRfBky/JlagkEuDzYJriJaIfy+QzdZ9vfrGrCpe O84CvI+f4DrE85MFvF5ycFkDOQrgrGo0WSuGNwx0GT+PAQgFkBepF8bUUzSGqA16NohqAO7E oAtVjpx6Z/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh5rD30XklWavoJhiKoLwPAa 1rFoXR9fxWeVSVYzTQuXRu2sWlWjA2Eg2dSkYPt8SJ23wO9UoJgncw1YgahDMN5Zg9Q55L66 DNNblpjqhHSosTYbhmDOkMTMOrAijGQA7KMmiVPVP7fZt3cU7lutry+vE49euqcJsHwN87n4 nASkpRsSood0fnGaS1ret2G9D2MRKAtBjWu7RjDsJCy8/BrZLQQFm+dGw=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.92,272,1650931200"; d="scan'208,217";a="887006890"
Received: from alln-core-4.cisco.com ([173.36.13.137]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 15 Jul 2022 01:32:34 +0000
Received: from mail.cisco.com (xfe-rtp-003.cisco.com [64.101.210.233]) by alln-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 26F1WYHN025002 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 15 Jul 2022 01:32:34 GMT
Received: from xfe-rtp-003.cisco.com (64.101.210.233) by xfe-rtp-003.cisco.com (64.101.210.233) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Thu, 14 Jul 2022 21:32:33 -0400
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-003.cisco.com (64.101.210.233) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Thu, 14 Jul 2022 21:32:33 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OFZ8uLdqijW1LT3ocoXysT/IiKGJYwua138AzOq18jTbfjJ+hShDK3fu1SSpA9aQAxcKFw+HbOLaUTxao2sHn7bTgUUCFOgee7QJi95snkZxwkL3R/VtTInXDKXwDEWt6A+bKw0kOi6MgmbHEL+GM9ncRb7kwD/80YqsIB96dtXGB7aQfLn/OYeQxYZtw7WjxeAoASJVBSui5j2NAWiQOq8yJ/IkQ/T5DD7YPW8s9MuIgzjEedhu6jQSrRw0QbsFL1CvYer6wdGoCYxF0r92PAi+8lImaHqWIJs4v8r5E1NQviwffZHCDIPpGsig8RO1tlkkyVqmSWEkmtiHmx6CDA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RFsD9cS+axwz/siBtPX73gF+hNsGvpwzZax5Iuic+VU=; b=kTsoQi9ssFdefNBfxOS2p6rkYVcaKSKmkkIQMh+fmikUS0TV3SL4USPSCN7N5G1d+sCALoQOBeydWwMBQHBduXPNdFxiQtNMu7Wens87esCVhKht02ODeRrz+/rSvFZtznG3NsIhYu5ozVJIpDAgnb2evyUg8laLCIo2OP6dl8FqFoChU7muOmQuCfM7RPnLuvSAdDXahmvalzSZs5X0AjzcXvCSC5dcw0tDRnEbvTHByg2EjHs5RAdymwPrHAAYR6d/WOS5jgDy3n2nLMQcRXU74kesDsA50aMZj+SbSc2vYfzpmavAgEz0iVKjNAOu4IDePi9zsnnHmRl2p9KwzQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RFsD9cS+axwz/siBtPX73gF+hNsGvpwzZax5Iuic+VU=; b=hdUuuJjBJNhChJ1H0kDblViEKPER3QzVvPTtSsQYZg3kXQWq9ZwWxxwMnj/kpYSooPkFfVBOZxMP91+kCnEUPSBizDx1vk4SGhB8QiofwZ48X5Aap59IvPEKxDR5nIJcKfdrLxe/ACsMcf6Emle2WRm81GJXGrJ4LD1KNrfK0qk=
Received: from BYAPR11MB2919.namprd11.prod.outlook.com (2603:10b6:a03:8d::21) by DM4PR11MB6264.namprd11.prod.outlook.com (2603:10b6:8:a5::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5417.26; Fri, 15 Jul 2022 01:32:26 +0000
Received: from BYAPR11MB2919.namprd11.prod.outlook.com ([fe80::51be:1e19:2c9a:c066]) by BYAPR11MB2919.namprd11.prod.outlook.com ([fe80::51be:1e19:2c9a:c066%5]) with mapi id 15.20.5417.026; Fri, 15 Jul 2022 01:32:26 +0000
From: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>
To: Phillip Hunt <phil.hunt@independentid.com>, "Matt Peterson (mpeterso)" <Matt.Peterson@oneidentity.com>
CC: Danny Zollner <Danny.Zollner@microsoft.com>, "scim@ietf.org" <scim@ietf.org>, Pamela Dingle <Pamela.Dingle@microsoft.com>, "Janelle Allen (janelall)" <janelall@cisco.com>
Thread-Topic: IETF 114 preliminary Agenda and call for other agenda requests
Thread-Index: AQHYlYEfkSWULc542Emjqax1cM69QK16I+LwgAGJ2KCAANZSAIAAmP/AgAF5fwD//56UgA==
Date: Fri, 15 Jul 2022 01:32:26 +0000
Message-ID: <872AE7ED-FA57-4705-900B-F47FFD39C04D@cisco.com>
References: <SJ1PR19MB6138FAAC718EC82367140F50E1889@SJ1PR19MB6138.namprd19.prod.outlook.com> <74B141BF-BF2D-4B7C-AA1D-3F161A84485B@independentid.com>
In-Reply-To: <74B141BF-BF2D-4B7C-AA1D-3F161A84485B@independentid.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.63.22070801
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 58faf79d-3fc4-4971-832d-08da6601dfd1
x-ms-traffictypediagnostic: DM4PR11MB6264:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: ucB4yl6sg/OfK8lhHYwTWFQjMbQn4/5pGA10fzypLZm4f57yONXycDpXHCZ3tkunsT/w3BcnIVSA4gqnsvX3BN4ga2djR2udcaRCNFzpJecEDgwAHngFi8UbHeXaxTgSmIa9x6hv51bUN+pdmtljXl3ocI435ekNQVFAsKVxbYfoSkcIw8G70Qz3Ntn1nxC+r1QVoTNEtmnMcDLTnj1tWUv7Sm+OwnueEgvwMIjfWFX1AWYdcG1MTZesFxoOSYgjCSrplwWUNAkByopIC8mcutaCRVuDTPAkhJDl/PyrHINuyn0oI6ly3lYIeuTwb/7KmXQjprslQn/XVapw2CX5kckRzqbTd473zd30vWTPKrHT2ZDANpbM/cYuQxoal8vh82uBaeNf07mQQ1ikoBSd31qCaOXKB5Z1+0d+/BDzYQesUxpNTw6qyG3tNwLIbd2d5yzQ8u6RA0z302DW5GvkdnoYSuvAgF70Gy9ezf5FcGMcep8CUyVibFN6ReUv4C9g/mZKoCy7CWIeYDCR2qVoEwFy+ZxRKr3sFan9ZM3UGvmyYXoycNX7N3m8rWgNd1NcEr/nWXk7VQUdGVGN8WLg7+xQ9EHhUJJep6pXGtrCDqftZe2xOCQfs/1OZRb4yduiZBiyAyJ4cqILLKCllbujSxJhUNlGXg2KzJ9ImEkDbHhkg64O3wZcKe/zMvgXb+1ZhYfhHXl1J+gdHKvD2Gr3keHXo906FYMw2jsyi6CokgKbaXhkL29KA2j1RhrVsYmCR3+FchaCmWzvpsOa3xIZiDBmprHFQEbN+rEvYRBS1hhTuASS89sAGjgspjYdKD9UOFPQ9TYVMxAJjEOKV4t2I+6PfvDPQ/wXIF8xT1oX0GYeeMs3HHE6WdB+XClgrJBR
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2919.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(376002)(346002)(136003)(39860400002)(396003)(366004)(9326002)(66556008)(38100700002)(64756008)(86362001)(110136005)(107886003)(4326008)(8676002)(316002)(186003)(66446008)(54906003)(5660300002)(2616005)(26005)(66476007)(76116006)(53546011)(8936002)(6506007)(6486002)(33656002)(166002)(122000001)(83380400001)(41300700001)(38070700005)(478600001)(30864003)(45080400002)(36756003)(66946007)(6512007)(71200400001)(2906002)(45980500001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_872AE7EDFA574705900BF47FFD39C04Dciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2919.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 58faf79d-3fc4-4971-832d-08da6601dfd1
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jul 2022 01:32:26.2240 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OxQOeJt4jzFJ84wi/JSvXZ0ZyYptiAJAuaUosNfW5dd6si1plbiyPJfHDLqAPKvA/Fv28N52Deit5xVsGcjWJQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB6264
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 64.101.210.233, xfe-rtp-003.cisco.com
X-Outbound-Node: alln-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/scim/IF78DXB1vkFzzCRvXnnTKXKTQjc>
Subject: Re: [scim] IETF 114 preliminary Agenda and call for other agenda requests
X-BeenThere: scim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Simple Cloud Identity Management BOF <scim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scim>, <mailto:scim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scim/>
List-Post: <mailto:scim@ietf.org>
List-Help: <mailto:scim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scim>, <mailto:scim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jul 2022 01:32:41 -0000

Hi Phil,

Speaking as a participant (not chair), I believe the SCIM events draft provide other capabilities beyond the filtering being discussed so
I would not discount its usefulness based on the pagination discussion.

That said (now as chair), we do need to discuss how the use cases that require filtering whether thru indexing, pagination or other proposals.
But we should describe the use cases as a formulation of requirements before we can address whether one proposal is better than another and
I’ve not been able to get a clear understanding of such requirements yet.

The proposed discussion topics are good but we’re still not congealing on the use cases that will drive requirements.  From the thread, I’m distilling
The need to discuss the following topics all of which need use cases to substantiate their requirements:

  *   Soft delete
  *   Account status
  *   HR schema action
  *   Roles and entitlements
  *   Pagination: there are several themes on this, but I’m trying to understand the breadth of use cases, as I’m distilling it as a form of either course or fine grain filtering.
  *   Change detection/delta query: what requirements are needed beyond the current capabilities in RFC7644 and the SCIM events draft?
We can tackle each of them individually as we have a 2 hr slot on Friday July 29 12:30-14:30ET  so I propose the following updated agenda:

5min   - agenda bash
5min.  – use case document draft update
10 min – soft delete
10 min  - account status
10min  - HR schema action
10min. – roles and entitlements
10 min.  – SCIM events draft update
10 min.  – change detection/delta query
45 min.  – Pagination

It would be good if Matt and Phil could help lead the discussion on Pagination with a goal of getting clear understanding of the use cases and requirements
To assess a path forward.  As it stands the draft submission deadline has passed.  Matt and Danny (and Janelle) you can submit your drafts during the IETF 114
Sessions but the group will likely not have had time to review the drafts so having you speak to the salient points is good.

We can also do some prep work in the side meetings and adjust agenda accordingly.  I’m leaving 5min as a transition buffer.  We do need to talk about milestones
But without having a clear understanding on what drafts/work we want to undertake, it will be hard to refine it so I’m prioritizing the discussions per this thread.

Thoughts/comments are of course welcomed.

Best, Nancy


From: Phillip Hunt <phil.hunt@independentid.com>
Date: Thursday, July 14, 2022 at 5:21 PM
To: "Matt Peterson (mpeterso)" <Matt.Peterson@oneidentity.com>
Cc: Danny Zollner <Danny.Zollner@microsoft.com>, "Nancy (ncamwing)" <ncamwing@cisco.com>, "scim@ietf.org" <scim@ietf.org>, Pamela Dingle <Pamela.Dingle@microsoft.com>, "Janelle Allen (janelall)" <janelall@cisco.com>
Subject: Re: IETF 114 preliminary Agenda and call for other agenda requests

Matt

I think we are going to have to agree to disagree on the performance and scalability issues of cursors. :)

The bigger issue is that having two solutions to the same problem is not useful from an interop perspective. Normally when multiple IDs are submitted for the same problem the group adopts one only. I thought that is what we did.

Maybe the group made an error by adopting scim events?  I encourage revisiting that decision one more time if it means one interoperable and implementable standard for all.

Phil


On Jul 13, 2022, at 7:27 PM, Matt Peterson (mpeterso) <Matt.Peterson@oneidentity.com> wrote:
Phil,

The cursor pagination draft was written for the common use case where SCIM service is written on top of an underlying database or protocol that uses cursors for result pagination.   This is a very common scenario.  We have implemented SCIM services on top of more than 30 different protocols and databases and nearly half of these use cursor pagination.  With this experience as evidence, I do not agree with your statement that cursor pagination requires the SCIM service to maintain copy of result sets.  It is trivial for SCIM service to store the back-end cursor, or even pass the cursor to the SCIM caller.   On the other hand, attempting to implement index/offset pagination on top of a database/protocol that uses cursors *does* require the SCIM service to maintain result sets (possibly the entire result set).

Also, there is no evidence that use of cursors for pagination in a web API opens a meaningful “denial of service attack vector”.    Many public (and extensively used) Web APIs use cursor pagination (including Facebook, and Twitter).   I can think of almost as many attacks with on index/offset as cursor.  All are easy to mitigate with trivial safeguards that server-side developers will be familiar with.

I do agree with you, that the primary use case for a SCIM client retrieving large (paginated) result sets is for the SCIM client to sync a “local cache” of results (especially for detecting deletes) – and that the SCIM events draft is a better approach for this use case.  However, I remember us testing the assertion in one discussion with the interest group (pre charter) with the suggestion that pagination (index or cursor) is not needed at all.   Not everyone agreed with us 😊

If we can convince the community that pagination of results is not needed then… great.  However, if we can’t, because people need it (or think they need it), then we should provide guidance for implementing *both* index/offset *and* (optionally) cursor pagination.

--
Matt

From: Phillip Hunt <phil.hunt@independentid.com>
Sent: Wednesday, July 13, 2022 11:42 AM
To: Danny Zollner <Danny.Zollner@microsoft.com>
Cc: Matt Peterson (mpeterso) <Matt.Peterson@oneidentity.com>; Nancy Cam-Winget (ncamwing) <ncamwing=40cisco.com@dmarc.ietf.org>; scim@ietf.org; Pamela Dingle <Pamela.Dingle@microsoft.com>; Janelle Allen (janelall) <janelall@cisco.com>
Subject: Re: IETF 114 preliminary Agenda and call for other agenda requests

CAUTION: This email originated from outside of the organization. Do not follow guidance, click links, or open attachments unless you recognize the sender and know the content is safe.

I’ve put some comments below. These are discussion items that presenters might want to include in their presentation.

Phillip Hunt
@independentid
phil.hunt@independentid.com<mailto:phil.hunt@independentid.com>





On Jul 12, 2022, at 9:12 PM, Danny Zollner <Danny.Zollner@microsoft.com<mailto:Danny.Zollner@microsoft.com>> wrote:

I’d like to cover the following items related to protocol and schema work:


  *   Cursor-based pagination – via Matt’s draft (that I somehow didn’t realize existed until last month!)
<PH> Much of the use case for this was to support replication and co-ordination of events across domains. How does/doesnot this specification conflict with the SCIM Events WG draft?

I remain ocncerned about the resource costs for service providers and the denial of service attack vector that results.  I have heard that many clients can’t hold a result set in memory. Fair enough. But in this case, would it be better to use a streaming parser OR simply store results direct to local disk for processing?

Why cursors are hard:  If a client has limited resources to store one result set, the cost to a service provider with thousands of clients is multiplied and may not be possible.  In todays systems, causing a SCIM service provider to hold temporary state over data impacts a cluster in many ways.  Today’s server is simply making calls to a database and doing some translation. The server itself is largely stateless. With cursors, the results sets have to be maintained and could effectively mean storing a copy of the entire database. In clusters enviornments (most of them) access to that result set likely needs to be shared.  If not the load-balancer has to maintain “sticky” connections so that each client request goes to the same cluster node.  This could still lead to problems if the client is too slow and the connection is reset. As written now, SCIM servers don’t need to hold “state” across requests.  Implementing cursors would mandate a major re-write for most implementations.

There is also a mistaken assumption that we need paging because SCIM has a result size limitation. That’s not part of SCIM Protocol. The spec simply permits service providers to set limits for things like Javascript UI clients. Presumably for a priviledged provisioning client, they ahve access to the enitre data set. It makes no sense to enforce a 1000 result set limit in these scenarios.

—> The problem is that many implementations make max results a server setting rather than an access control entitlement.  This is not so much something we need to deal with. We may just need to alert industry product managers of why they need to support provisioning clients properly.



  *
  *   Multi-valued attribute pagination – Phil’s draft is a good place to start there. Based on feedback on the mailing list a few months ago, I think there are questions on whether multi-valued attribute filtering is needed, which is also included in Phil’s draft. Splitting multi-valued attribute pagination away from multi-valued attribute filtering if/when it is adopted by the working group may be the best choice.
<PH> The current draft re-uses aspects of SCIM that already supports CMVA filtering. For this reaon, pulling the functionality apart doesn’t make sense. AFAIK there are only a couple of requestors (e.g. Gregg Wilson/Oracle) for this draft.  Without wider support, should we drop the spec?

I wasn’t planning on presenting this. Please let me know if I should.



  *
  *   Discussion on change detection/delta query approaches – I’ll prepare some slides on this and may try to send out an email this week or next week as well, but won’t have a draft for this by IETF 114.
<PH> The current SCIM Protocol spec indicates support for ETAGs specifically in Sec 3.14 of RFC7644 (versioning resources) and can be used in queries. In SCIM’s case an ETAG is a hash of the resource. ETAGs more broadly in HTTP allow a requestor to make queries or changes using HTTP Preconditions (RFC7232).  For example, you can do a GET conditional only on the resource having changed. You can also condity a modify (PUT, PATCH, DELETE) on a resource being unchanged (has a specific etag) or has/has not changed since a specified date.  I suspect pre-conditions are not widely supported in many SCIM implementations.  I have implemented it in i2scim.io<https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fi2scim.io%2F&data=05%7C01%7CMatt.Peterson%40oneidentity.com%7C3f2c805b3b684d17db1108da64eeac0c%7C91c369b51c9e439c989c1867ec606603%7C0%7C0%7C637933273500225059%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=PK%2FZtvyWpuE%2FWaZLIMoel4OGAS5m8MeK8WIamkeUA6I%3D&reserved=0>.

I am not sure if this is what you are really after, but you may want to distinguish your requirement from the HTTP standard if different.  :-)

Also, SCIM Events intent is to notify subscribers of changes in real time.  In the simplest message, the new etag is shared (an etag is a hash of the resource).



  *
  *   Soft deletion
  *   Expansion of account status context beyond active true/false – Janelle is working on a draft for this, although I do not know if this will make it in time for IETF 114
  *   My roles/entitlements draft – it has expired but I’ll renew it and would like to put it up for a call for adoption. I don’t know if we need to figure out the contains/containedBy topic that I wrote to the mailing list about last month prior to adoption or if that can be left for the working group to figure out later
  *   HR Schema action plan/next steps
  *   Resetting the milestones that we set last year? (Do we need to worry about this?)

     *   Current plan is that we work on a bunch of the new features in the form of separate extension drafts to SCIM 2.0, and leave RFC 7643 and 7644 alone for now. Once we’re further along in the new features (i.e.: the above + others from the charter) we can determine the final approach of how to make changes to the protocol and schema – that is, do we revise SCIM 2.0 schema and protocol docs while remaining 2.0 but issuing new RFCs (apparently possible), or increment version.
<PH> I haven’t really seen a need to go to SCIM 2.x or 3. Almost all the enhancements can be positioned as extensions to the current SCIM 2 RFCs.

Some of the discussion about extending groups etc suggest much more complex CMVA objects (e.g. verified claims etc). This is interesting. But I would prefer to simply deifne new objects rather than version the protocol first.  There is also nothing saying you can’t have a group represented “virtually” where extended schema is available at one resource path “/<extended>Groups/“ while “/Groups” holds the old schema version of the same groups.

The more complex extension would be to add meta data to attributes like roles.   In some systems, a role binding is actually a policy that has thins like conditions and expiry dates.
—> I guess what I am saying here is this topic deserves a lot of dinner time and hallway discussion over many glasses of wine and beers.

As for editorial clean ups, I am not sure myself what the IETF permits moving from “proposed standard” to “standard” which is another possible route.   In particular, I think many of the examples need to be improved as people depend too much on figures and have gotten mis-leading impressions.  Some of the figures need to better reflect the normative text intent.  I have a concern that many don’t realize that SCIM is technicly a profile of HTTP and that the HTTP RFC do apply. I wonder if in the introduction, we can make this more obvious/clear.

There is one issue with PATCH that we should clarify.  I believe it was wether replacing a value for an attribute value that does not exist MAY be converted to an ADD.  In Postel’s ROBUST design, I would say go for it. There are others that say the transaction that must fail.  The spec is ambiguous on this point and any clarfication would result in a normative change for some.


I think these topics could easily take an hour, if not more. Whatever time is not used by use cases or SCIM Events can be allocated here.

Thanks,

Danny Zollner

From: Matt Peterson (mpeterso) <Matt.Peterson@oneidentity.com<mailto:Matt.Peterson@oneidentity.com>>
Sent: Monday, July 11, 2022 11:35 PM
To: Nancy Cam-Winget (ncamwing) <ncamwing=40cisco.com@dmarc.ietf.org<mailto:ncamwing=40cisco.com@dmarc.ietf.org>>; scim@ietf.org<mailto:scim@ietf.org>; Pamela Dingle <Pamela.Dingle@microsoft.com<mailto:Pamela.Dingle@microsoft.com>>; Janelle Allen (janelall) <janelall@cisco.com<mailto:janelall@cisco.com>>; Danny Zollner <Danny.Zollner@microsoft.com<mailto:Danny.Zollner@microsoft.com>>; Phillip Hunt <phil.hunt@independentid.com<mailto:phil.hunt@independentid.com>>
Subject: [EXTERNAL] RE: IETF 114 preliminary Agenda and call for other agenda requests

Nancy,

There has been recent activity on the mailing list (and also discussion in the SCIM interest group before our chart) that shows continued interest in cursor pagination (draft-peterson-scim-cursor-pagination).

If appropriate for our charter, I would like one more opportunity to check if cursor pagination is interesting to enough people to warrant effort on my part to create a new revision of the draft to address 2 interoperability issues that were raised on the mailing list last month.

--
Matt

From: scim <scim-bounces@ietf.org<mailto:scim-bounces@ietf.org>> On Behalf Of Nancy Cam-Winget (ncamwing)
Sent: Monday, July 11, 2022 6:51 PM
To: scim@ietf.org<mailto:scim@ietf.org>; Pamela Dingle <Pamela.Dingle@microsoft.com<mailto:Pamela.Dingle@microsoft.com>>; Janelle Allen (janelall) <janelall@cisco.com<mailto:janelall@cisco.com>>; Danny Zollner <Danny.Zollner@microsoft.com<mailto:Danny.Zollner@microsoft.com>>; Phillip Hunt <phil.hunt@independentid.com<mailto:phil.hunt@independentid.com>>
Subject: [scim] IETF 114 preliminary Agenda and call for other agenda requests

CAUTION: This email originated from outside of the organization. Do not follow guidance, click links, or open attachments unless you recognize the sender and know the content is safe.

Hello SCIMers,

Here is the current proposed agenda and a call for other requests:

5 min: Agenda Bash & Logistics
                SCIM Chairs: Nancy Cam-Winget, Aaron Parecki

TDB min: Use Cases
                Pamela Dingle

TBD min: Protocol & Schema
                Janelle Allen and Danny Zollner

TBD min: SCIM Events
                Phil Hunt
AOB

@Pamela Dingle<mailto:Pamela.Dingle@microsoft.com>, @Janelle Allen (janelall)<mailto:janelall@cisco.com>, @Danny Zollner<mailto:Danny.Zollner@microsoft.com> and @Phillip Hunt<mailto:phil.hunt@independentid.com>: can you provide requested times to provide updates on the work above?

If there are other requests for agenda slots, please reply to this email or send a request to scim-chairs@ietf.org<mailto:scim-chairs@ietf.org>

Thanks, Nancy