Re: [scim] [EXTERNAL] Re: Feedback and adoption readiness for draft-zollner-scim-roles-entitlements-extension

Connor Rowe <connor.rowe@okta.com> Tue, 17 January 2023 21:55 UTC

Return-Path: <connor.rowe@okta.com>
X-Original-To: scim@ietfa.amsl.com
Delivered-To: scim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69F84C151531 for <scim@ietfa.amsl.com>; Tue, 17 Jan 2023 13:55:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.682
X-Spam-Level:
X-Spam-Status: No, score=-2.682 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=okta.com header.b="M2fqIHlL"; dkim=pass (1024-bit key) header.d=okta.com header.b="Z/0HADeb"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kh68rK6OkRay for <scim@ietfa.amsl.com>; Tue, 17 Jan 2023 13:55:03 -0800 (PST)
Received: from mx0a-00553301.pphosted.com (mx0a-00553301.pphosted.com [205.220.164.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10315C15152D for <scim@ietf.org>; Tue, 17 Jan 2023 13:55:03 -0800 (PST)
Received: from pps.filterd (m0209335.ppops.net [127.0.0.1]) by mx0b-00553301.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 30HLm2Pw014323 for <scim@ietf.org>; Tue, 17 Jan 2023 13:55:02 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=okta.com; h=mime-version : references : in-reply-to : from : date : message-id : subject : to : cc : content-type; s=proofpoint-2020; bh=F8dwkc0N1BV0iMPMd+CRQdA+ZcWR8Ddbnka4WRFLReE=; b=M2fqIHlL9vIRfXvp1HpA1zACwGU1etpOS+JNlpb8EWSKeu0aJtQbmi2GZ8OidzUEitxQ 6rv2VT6FKMMR0LHk/GLqZRLU05QsKI2N3RIFetUWBR+au4d4YsNAycRGPdzX0fd0agFM 2PJTa95FFcPesF1qlMLXoL44rosI51p+6aDfbk7AxA7YpTiknWWGu8scJQxomrHfAC5w sJR7XdMyh9olHhxHXSog1ePwij6z4Cg2mNu3/8fe8qpgNN6tjtDPEUjTX7JD0IaP9M21 jsP2Qt1i2lgf6xeE14WVZ4TtaU0B7qtElLZK9AE7lEjR63ab+ClAETtg6rhFMQNAJjqB lw==
Received: from mail-qt1-f200.google.com (mail-qt1-f200.google.com [209.85.160.200]) by mx0b-00553301.pphosted.com (PPS) with ESMTPS id 3n3vfc4p85-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for <scim@ietf.org>; Tue, 17 Jan 2023 13:55:02 -0800
Received: by mail-qt1-f200.google.com with SMTP id k8-20020ac84788000000b003b631e8cc4dso2360142qtq.16 for <scim@ietf.org>; Tue, 17 Jan 2023 13:55:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=okta.com; s=gap; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=F8dwkc0N1BV0iMPMd+CRQdA+ZcWR8Ddbnka4WRFLReE=; b=Z/0HADebgQe9Nt9F/2PaRIj4B9SkYPKoJvEHEBv4zXdr9L2ywS4k9/62HYkmDJ/RNP x66gfzDPXoL57+6bJstz04y7Gl8VoOZbXQ8WiE8LTT69TASnCOUwy1UZ75K3oIW/Abi7 EmP4y3S8mJ7gD2K3HXUyjXmxaOeaOvgGLiowY=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=F8dwkc0N1BV0iMPMd+CRQdA+ZcWR8Ddbnka4WRFLReE=; b=D+SK9f3PHYpDa8QZ762CCmgED2nisTOnRTeamXvR00xx17WJ6I2mk+q3ggidVPPTGG ub9OpTxJbPVZwHd0zPnCsfUwcY64n4ZaYHyqQAdhAMS3fXBm1LCQ3whKU9VP7P43SkWp HMrt+8jus886eCYaN1XkgEfD3fljRiCKLQznIDpyY7taDPmjhGNCzs5EOHxxHRVL2Xyf QRtOKS9cchpAqaJ7pXtLdwyHnIEFuTVdP6FAG8tpPPZm59b0kujrg7dxNKY17TByVQGe VBO9bbkTvSxNBjo0vZSxmxU/YIdsZ6W9v2lnl//XaeuyZbgHSjuuXW6zdYwhLuxyNRX9 RMzg==
X-Gm-Message-State: AFqh2kq7ULjr1YCjFVOOKysZHCYO+5g/agacjlMfi5ybKMRJ786C4zdV cGkark1c9dAAUXwWpXhv4zC2pppL+xzRLN2u2fCgis63D/9PZk3c6ghPoYumYMZp9uELOPtBi5r 7iV0W8HvuLVlVetAUSp0=
X-Received: by 2002:a05:620a:1594:b0:705:4de9:a574 with SMTP id d20-20020a05620a159400b007054de9a574mr202935qkk.202.1673992501113; Tue, 17 Jan 2023 13:55:01 -0800 (PST)
X-Google-Smtp-Source: AMrXdXvXJETJhBIKLolVoGW4haYKar1kVweRFxcDQz29BZ/AtYIIfYabkTXcuRRUA/CwBBtW0udSCubreQV78G4bOW8=
X-Received: by 2002:a05:620a:1594:b0:705:4de9:a574 with SMTP id d20-20020a05620a159400b007054de9a574mr202923qkk.202.1673992500656; Tue, 17 Jan 2023 13:55:00 -0800 (PST)
MIME-Version: 1.0
References: <mailman.116.1667502003.4654.scim@ietf.org> <CAKXu=h99keXizyyikOfnnoN-ziEF_Rh5rkxo26n6DdijKJb=5g@mail.gmail.com> <CH2PR00MB07111FF49E3258F4DD5B936DFF389@CH2PR00MB0711.namprd00.prod.outlook.com> <CAH9eYVruEt4uz+ON1Jd=ryQy0NHqP76esqdO+SM4jHBbk7WtgA@mail.gmail.com> <CAMAaMjXeNCCsJX2TBnJw4B4=YvVo=MMpxwF898HYx4L3kWwSDg@mail.gmail.com>
In-Reply-To: <CAMAaMjXeNCCsJX2TBnJw4B4=YvVo=MMpxwF898HYx4L3kWwSDg@mail.gmail.com>
From: Connor Rowe <connor.rowe@okta.com>
Date: Tue, 17 Jan 2023 13:54:49 -0800
Message-ID: <CAMAaMjUrONevZWB2mE99jH5xOfws23u0jHMVb7Onh13krKrcQw@mail.gmail.com>
To: Brian Demers <brian.demers@gmail.com>
Cc: Danny Zollner <Danny.Zollner=40microsoft.com@dmarc.ietf.org>, Chad Vincent <chad.vincent@crashplan.com>, "scim@ietf.org" <scim@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005bd74605f27cc081"
X-Gmail-Okta-Auth: Authenticated
X-Gm-Spam: 0
X-Gm-Phishy: 0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.923,Hydra:6.0.562,FMLib:17.11.122.1 definitions=2023-01-17_10,2023-01-17_01,2022-06-22_01
Archived-At: <https://mailarchive.ietf.org/arch/msg/scim/l4RjSmny8CfdlygVafiW95_K_DY>
Subject: Re: [scim] [EXTERNAL] Re: Feedback and adoption readiness for draft-zollner-scim-roles-entitlements-extension
X-BeenThere: scim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Simple Cloud Identity Management BOF <scim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scim>, <mailto:scim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scim/>
List-Post: <mailto:scim@ietf.org>
List-Help: <mailto:scim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scim>, <mailto:scim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jan 2023 21:55:07 -0000

Correcting myself - I managed to miss the `multiple*Supported` attributes
in the entitlements/roles schema, so my second note is already covered.

On Tue, Jan 17, 2023 at 11:25 AM Connor Rowe <connor.rowe@okta.com> wrote:

> Thanks for all the work you've done on this draft, Danny! Agree with all
> of the `id` commentary in the thread but I think that's been sufficiently
> discussed. I did have a few more thoughts to include.
>
> - Taking point 1 of Brian's message a step further, are the `roles` and
> `entitlements` attributes the only valid way to communicate
> entitlements/access-controlling information? What if we had a common schema
> and each implementation could surface that data in whichever attribute
> makes the most sense. One application could expose `roles` and
> `entitlements` while another might expose `userTypes` and `licenses`.
>
> - Another use-case I've seen in the wild that we may want to support is
> distinguishing between entitlement attributes where you can select any
> combination of the allowed values (similar to the examples in the draft)
> and entitlement attributes where only one of the allowed values may be
> chosen at a time. This could allow an identity management product acting as
> a SCIM server to make an informed choice to expose a dropdown/radio button
> or multi-select as needed in admin interfaces.
>
> On Tue, Nov 8, 2022 at 4:57 PM Brian Demers <brian.demers@gmail.com>
> wrote:
>
>> *This message originated outside your organization.*
>>
>> ------------------------------
>>
>> This caught my eye because Chad mentioned Apache SCIMple, so I took a
>> quick pass at hacking up what this would look like in SCIMple.
>>
>> That generated a few questions, forgive me if these were already covered
>> somewhere else:
>>
>> 1. The Role and Entitlement schemas look identical, except for minor
>> changes in the descriptions.  Should both these new resources make use of a
>> common schema?
>> 2. Section 4.1 calls out a ServiceProviderConfig Extension.  I didn't see
>> anything in rfc7643 on how this would work.  Would this be a new 3rd schema
>> that is added to the ServiceProviderConfig response? Or is this
>> mechanism defined somewhere else?
>> 3. Each Role/Entitlement can have an id, value, display, and type.
>>   a. What is the difference between `type` and `value`?
>>   b. While I probably agree `display` _should_ be unique to the "server",
>> is this an actual requirement?  I could potentially see attributes "value"
>> and "display" being mapped to some implementation's "name" and
>> "description" (respectively), where "description" _may_ not have a unique
>> requirement.
>> 4. nit: the schema names should use a singular form of the nouns (to be
>> consistent with the Core Schemas),
>> i.e. urn:ietf:params:scim:schemas:2.0:Entitlement
>> and urn:ietf:params:scim:schemas:2.0:Role
>>  - Potentially starting with `urn:ietf:params:scim:schemas:extension:`
>> to use similar naming pattern as the EnterpriseUser schema (though this
>> doesn't seem required rfc7643 section 10)
>>
>> Thanks!
>> -Brian
>>
>> On Thu, Nov 3, 2022 at 5:32 PM Danny Zollner <Danny.Zollner=
>> 40microsoft.com@dmarc.ietf.org> wrote:
>>
>>> Hi Chad,
>>>
>>>
>>>
>>> I recall receiving this same feedback previously and in the next version
>>> of the draft (perhaps the first new version post-adoption?) language will
>>> be added to explicitly call out the use of common attributes. If I were to
>>> split hairs here, I’d argue that even without the draft explicitly calling
>>> them out, the text in 7643 3.1 states that those attributes are required to
>>> exist on all resource types including new extensions like the ones in this
>>> draft. It is a mistake to not explicitly call out the correct usage of
>>> those attributes in this draft, though, so it will be fixed.
>>>
>>>
>>>
>>> Thanks,
>>>
>>>
>>>
>>> *Danny Zollner* (He/Him)
>>>
>>> *From:* scim <scim-bounces@ietf.org> *On Behalf Of * Chad Vincent
>>> *Sent:* Thursday, November 3, 2022 4:09 PM
>>> *To:* scim@ietf.org
>>> *Subject:* [EXTERNAL] Re: [scim] Feedback and adoption readiness for
>>> draft-zollner-scim-roles-entitlements-extension
>>>
>>>
>>>
>>> Some people who received this message don't often get email from
>>> chad.vincent@crashplan.com. Learn why this is important
>>> <https://urldefense.com/v3/__https://aka.ms/LearnAboutSenderIdentification__;!!PwKahg!4fVL2tBJsHfvqmDAANszvEPWLT6MSB_iyOqOQfgBBQf7OnK_3OheLzF8Sv6_yH2lpJFQanuOzg6PDGZnsrPtPA$>
>>>
>>> I love this - we use roles currently and having a more formal spec and
>>> ability for the client to read what's available could come in very handy in
>>> the future.  So mark me down as a 5.
>>>
>>>
>>>
>>> However, these resources not including the common attributes set
>>> mandated by RFC 7643 section 3.1 should be explained/clarified in the RFC.
>>> The Apache SCIMple library will have to handle these resources as
>>> special-cases since they won't have the required "id" field, for example.
>>> That seems major enough to justify a paragraph.
>>>
>>>
>>>
>>> ---------- Forwarded message ----------
>>> From: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>
>>> To: SCIM WG <scim@ietf.org>
>>> Cc:
>>> Bcc:
>>> Date: Wed, 2 Nov 2022 23:40:10 +0000
>>> Subject: [scim] Feedback and adoption readiness for
>>> draft-zollner-scim-roles-entitlements-extension
>>>
>>> Hello SCIMers,
>>>
>>>
>>>
>>> We need feedback on to gauge support and adoption readiness of:
>>>
>>> https://datatracker.ietf.org/doc/draft-zollner-scim-roles-entitlements-extension/ <https://urldefense.com/v3/__https://nam06.safelinks.protection.outlook.com/?url=https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fdraft-zollner-scim-roles-entitlements-extension*2F&data=05*7C01*7Cdanny.zollner*40microsoft.com*7Ca11aede3fdb54846b08b08dabddfa397*7C72f988bf86f141af91ab2d7cd011db47*7C1*7C0*7C638031065521821498*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*7C*7C*7C&sdata=rh2rD2ai4JphkRpxltG1sVgpXPy5ZuOs8xr4FSmvAl0*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSUlJQ!!PwKahg!4fVL2tBJsHfvqmDAANszvEPWLT6MSB_iyOqOQfgBBQf7OnK_3OheLzF8Sv6_yH2lpJFQanuOzg6PDGaYKAbNXQ$>
>>>
>>> Please respond to this thread on the following:
>>>
>>>
>>>
>>>
>>>
>>>   1.  You have read the draft and believe it is ready to be adopted by the working group. Any other feedback on the content of the draft is welcomed too.
>>>
>>>   2.  You are willing to be an active contributor or reviewer of the document
>>>
>>>   4.  You support the draft and plan to implement
>>>
>>>   5.  You support the draft but have no time or plans to implement now, but can provide feedback
>>>
>>>   6.  You have no interest in the draft
>>>
>>>
>>>
>>> Please provide your feedback by November 28th.
>>>
>>>
>>>
>>> Thanks,
>>>
>>>    Nancy
>>>
>>>
>>>
>>>
>>>
>>>
>>> ---------- Forwarded message ----------
>>> From: Paul Lanzi <paul@remediant.com>
>>> To: SCIM WG <scim@ietf.org>
>>> Cc:
>>> Bcc:
>>> Date: Wed, 2 Nov 2022 16:50:26 -0700
>>> Subject: Re: [scim] Feedback and adoption readiness for
>>> draft-zollner-scim-roles-entitlements-extension
>>>
>>> #4 for me.
>>>
>>> Thanks,
>>>
>>> --Paul
>>>
>>> ᐧ
>>>
>>>
>>>
>>> On Wed, Nov 2, 2022 at 4:40 PM Nancy Cam-Winget (ncamwing) <ncamwing=
>>> 40cisco.com@dmarc.ietf.org> wrote:
>>>
>>> Hello SCIMers,
>>>
>>>
>>>
>>> We need feedback on to gauge support and adoption readiness of:
>>>
>>> https://datatracker.ietf.org/doc/draft-zollner-scim-roles-entitlements-extension/ <https://urldefense.com/v3/__https://nam06.safelinks.protection.outlook.com/?url=https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fdraft-zollner-scim-roles-entitlements-extension*2F&data=05*7C01*7Cdanny.zollner*40microsoft.com*7Ca11aede3fdb54846b08b08dabddfa397*7C72f988bf86f141af91ab2d7cd011db47*7C1*7C0*7C638031065521821498*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*7C*7C*7C&sdata=rh2rD2ai4JphkRpxltG1sVgpXPy5ZuOs8xr4FSmvAl0*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSUlJQ!!PwKahg!4fVL2tBJsHfvqmDAANszvEPWLT6MSB_iyOqOQfgBBQf7OnK_3OheLzF8Sv6_yH2lpJFQanuOzg6PDGaYKAbNXQ$>
>>>
>>> Please respond to this thread on the following:
>>>
>>>
>>>
>>>
>>>
>>>   1.  You have read the draft and believe it is ready to be adopted by the working group. Any other feedback on the content of the draft is welcomed too.
>>>
>>>   2.  You are willing to be an active contributor or reviewer of the document
>>>
>>>   4.  You support the draft and plan to implement
>>>
>>>   5.  You support the draft but have no time or plans to implement now, but can provide feedback
>>>
>>>   6.  You have no interest in the draft
>>>
>>>
>>>
>>> Please provide your feedback by November 28th.
>>>
>>>
>>>
>>> Thanks,
>>>
>>>    Nancy
>>>
>>>
>>>
>>> _______________________________________________
>>> scim mailing list
>>> scim@ietf.org
>>> https://www.ietf.org/mailman/listinfo/scim
>>> <https://urldefense.com/v3/__https://nam06.safelinks.protection.outlook.com/?url=https*3A*2F*2Fwww.ietf.org*2Fmailman*2Flistinfo*2Fscim&data=05*7C01*7Cdanny.zollner*40microsoft.com*7Ca11aede3fdb54846b08b08dabddfa397*7C72f988bf86f141af91ab2d7cd011db47*7C1*7C0*7C638031065521821498*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*7C*7C*7C&sdata=4otD1jdaBdQwRKUTMXObgdBmvi*2Fb2dAOQ3n7Zr1HkA0*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSU!!PwKahg!4fVL2tBJsHfvqmDAANszvEPWLT6MSB_iyOqOQfgBBQf7OnK_3OheLzF8Sv6_yH2lpJFQanuOzg6PDGbaaRzFnw$>
>>>
>>> _______________________________________________
>>> scim mailing list
>>> scim@ietf.org
>>> https://www.ietf.org/mailman/listinfo/scim
>>> <https://urldefense.com/v3/__https://nam06.safelinks.protection.outlook.com/?url=https*3A*2F*2Fwww.ietf.org*2Fmailman*2Flistinfo*2Fscim&data=05*7C01*7Cdanny.zollner*40microsoft.com*7Ca11aede3fdb54846b08b08dabddfa397*7C72f988bf86f141af91ab2d7cd011db47*7C1*7C0*7C638031065521821498*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*7C*7C*7C&sdata=4otD1jdaBdQwRKUTMXObgdBmvi*2Fb2dAOQ3n7Zr1HkA0*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSU!!PwKahg!4fVL2tBJsHfvqmDAANszvEPWLT6MSB_iyOqOQfgBBQf7OnK_3OheLzF8Sv6_yH2lpJFQanuOzg6PDGbaaRzFnw$>
>>>
>>>
>>>
>>>
>>> --
>>>
>>> Chad Vincent (he/him) | Software Engineer, Senior - CrashPlan
>>>
>>> chad.vincent@crashplan.com
>>>
>>> 400 S 4th St Suite 410 PMB 31083 Minneapolis, MN 55415-1419
>>>
>>>
>>>
>>>
>>> <https://urldefense.com/v3/__https://nam06.safelinks.protection.outlook.com/?url=https*3A*2F*2Fcrashplan.com*2F&data=05*7C01*7Cdanny.zollner*40microsoft.com*7Ca11aede3fdb54846b08b08dabddfa397*7C72f988bf86f141af91ab2d7cd011db47*7C1*7C0*7C638031065521821498*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*7C*7C*7C&sdata=5WxnnaHSXPH1DLp87goymJj9*2Flo*2BxVQlUsCUw*2FNJK2s*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSU!!PwKahg!4fVL2tBJsHfvqmDAANszvEPWLT6MSB_iyOqOQfgBBQf7OnK_3OheLzF8Sv6_yH2lpJFQanuOzg6PDGbLCTzl6w$>
>>>
>>>
>>> _______________________________________________
>>> scim mailing list
>>> scim@ietf.org
>>> https://www.ietf.org/mailman/listinfo/scim
>>> <https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/scim__;!!PwKahg!4fVL2tBJsHfvqmDAANszvEPWLT6MSB_iyOqOQfgBBQf7OnK_3OheLzF8Sv6_yH2lpJFQanuOzg6PDGbxopDeqA$>
>>>
>> _______________________________________________
>> scim mailing list
>> scim@ietf.org
>> https://www.ietf.org/mailman/listinfo/scim
>>
>