[scim] Question on "Discovery and negotiation of client credentials"

Paul Lanzi <paul@remediant.com> Mon, 02 May 2022 17:33 UTC

Return-Path: <paul@remediant.com>
X-Original-To: scim@ietfa.amsl.com
Delivered-To: scim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E667C14F731 for <scim@ietfa.amsl.com>; Mon, 2 May 2022 10:33:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.084
X-Spam-Level:
X-Spam-Status: No, score=-7.084 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=remediant.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ae_zCKbrGN_m for <scim@ietfa.amsl.com>; Mon, 2 May 2022 10:33:21 -0700 (PDT)
Received: from mail-qt1-x82f.google.com (mail-qt1-x82f.google.com [IPv6:2607:f8b0:4864:20::82f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B99EAC15E3FC for <scim@ietf.org>; Mon, 2 May 2022 10:33:21 -0700 (PDT)
Received: by mail-qt1-x82f.google.com with SMTP id p4so11046967qtq.12 for <scim@ietf.org>; Mon, 02 May 2022 10:33:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=remediant.com; s=google; h=mime-version:from:date:message-id:subject:to; bh=tMj3W5FUBri9V4m6geyS74opuMDmHoeNoBtxdkZIwC4=; b=LUKYLpsediQM8sw11pbBA1WQHay3KZVwmFlFeQJ0f45KCRrGX2nD/bMqlo3avagsHq FrzAw8Y/wihUwRE7470vz3E2NGNdKZNyRZDnGeaKV8oMxnYTPVLDibGOOodKzHaL3BSV pQA11UMci+byOfFwUqViZCljHjodqaCQoKRdU=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=tMj3W5FUBri9V4m6geyS74opuMDmHoeNoBtxdkZIwC4=; b=axeNs/TJCfcljANoD8tMtq5n9Em2bxJUjgzmNgJfz2bHLVtHRiXZoCvWtvaX0HOcHR iOG6Ej3G5B2aPd/6upuqByTwqajJ73CIG06s/XSle5NIY8swXNVEp9ihy3ja3Nb3wW26 DosOz9en6pRXtB+sv9fy+6n8v16ezgk97IDiWp9px4mpA7L8bCR4NOsU5kSJOHVBIZpy CI5rr3HT+t6jTNg7oEnG0d3MHrZ6SvMvSeQ7OLgQ/DxMFmOJCNthpD5LMq1MfqImjeoB hk71d0S8vaHlNd7jHQMMXj+7fJJm4lAz8BA7JQXRcabFHaJaZAe6V1GhyypLtQSv2NUc GTpg==
X-Gm-Message-State: AOAM532w1WeDPcvM+/43md7AdxuuYZzitN8zfBCoh+9zX6FM5+/mReGC GBxBz7cF5CGaT25SiGCmpD3o4dWZ8di67dPqseG7hTenctQDtT3x
X-Google-Smtp-Source: ABdhPJzuNFLRJ5WWQP/D2xX2EW4KSjdmQqIfAvIKxF+o3Krpv2hcRRNJlXcFTX2b/aJZ8PtPTgTPm01ZvHaD1ivQWNg=
X-Received: by 2002:ac8:5f95:0:b0:2f3:92d7:a9c3 with SMTP id j21-20020ac85f95000000b002f392d7a9c3mr11235198qta.539.1651512800084; Mon, 02 May 2022 10:33:20 -0700 (PDT)
MIME-Version: 1.0
From: Paul Lanzi <paul@remediant.com>
Date: Mon, 02 May 2022 10:33:09 -0700
Message-ID: <CA+7VvRb04i0vKHkCTQC0x6nPyJZOT7x0PXqvk=F56mbXi_oamA@mail.gmail.com>
To: scim@ietf.org
Content-Type: multipart/alternative; boundary="000000000000ca9b0c05de0ac955"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scim/Iu7_kABX5K6x58k2XRl9CHkeTpA>
Subject: [scim] Question on "Discovery and negotiation of client credentials"
X-BeenThere: scim@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Simple Cloud Identity Management BOF <scim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scim>, <mailto:scim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scim/>
List-Post: <mailto:scim@ietf.org>
List-Help: <mailto:scim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scim>, <mailto:scim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 May 2022 17:33:26 -0000

Danny Zollner and I are completing work on our presentation for Identiverse
and wanted to make sure we give fair voice to all elements mentioned in the
charter. One item in the charter that hasn't (seemingly?) had much further
discussion is:* Support for advanced automation scenarios such as:
  * Discovery and negotiation of client credentials
  * Attribute mapping
  * Per-attribute schema negotiationWhile the last two points are fairly
straightforward to describe, the item "Discovery and negotiation of client
credentials" is less clear and doesn't (seem) to have had any elaboration
on the mailing list. Could the person/persons who suggested this topic area
provide a bit more information on what's being sought with that point in
the charter?


*Paul Lanzi* | Co-Founder and COO

Remediant, Inc.

Two Embarcadero Ctr, Floor 8 | San Francisco, CA 94111
<https://streaklinks.com/BCCouDzc3DqMfIQavAzxhGGW/https%3A%2F%2Fgoo.gl%2Fmaps%2FBiRGzAJgGqSaZyDE6>

paul@remediant.com  | (415) 854-5152 [m]


<https://streaklinks.com/BCCouDrkpJSRyyn8DAlITxKg/https%3A%2F%2Fwww.facebook.com%2FRemediant>

<https://streaklinks.com/BCCouF1JCeBOHwhKCAsbO6FE/https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fremediant>

<https://streaklinks.com/BCCouDrICORofYQyjAmGqNly/https%3A%2F%2Ftwitter.com%2FRemediant>

<https://streaklinks.com/BCCouDnLy9m3Mm99sQyLuyFp/https%3A%2F%2Fwww.youtube.com%2Fc%2FRemediant>


<https://streaklinks.com/BCCouDrn59zM2ox60QuEsi36/https%3A%2F%2Fwww.remediant.com%2Fblog%2Fremediant-is-recognized-as-honorable-mention-in-the-2021-gartner-magic-quadrant-for-privileged-access-management>
ᐧ