Re: [scim] Discussion Item: Personally Identifiable Information in SCIM

"Janelle Allen (janelall)" <janelall@cisco.com> Tue, 16 November 2021 17:34 UTC

Return-Path: <janelall@cisco.com>
X-Original-To: scim@ietfa.amsl.com
Delivered-To: scim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B9F03A0A5F for <scim@ietfa.amsl.com>; Tue, 16 Nov 2021 09:34:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.585
X-Spam-Level:
X-Spam-Status: No, score=-9.585 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, T_FILL_THIS_FORM_SHORT=0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=VSdCRwT8; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=OqZe7HvI
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ss9PjlG7yFEI for <scim@ietfa.amsl.com>; Tue, 16 Nov 2021 09:34:18 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 88DD33A09F0 for <scim@ietf.org>; Tue, 16 Nov 2021 09:34:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=33728; q=dns/txt; s=iport; t=1637084049; x=1638293649; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=8mc0L9I2y+hnpTvb5aReLb4WBI+lwcCNlS2mp6/7Tc8=; b=VSdCRwT8fZDXD0geQJjHJ5VGGDT5Bu7KXmbCUrBJwdHmUn4sAt2eAOuF 5K+rcT7yOGusnJW8A1YGY8Yjwelx7XDdnMncTliD2KuR2VHwE3XBeFjUJ ZsWlwEFuQERVC2ZXyYGS4sVLo3aShXfp0eyiiHTolNiyO7Jp9VdVPrtOA o=;
IronPort-PHdr: A9a23:V23yDR97/Sz0Mf9uWCXoyV9kXcBvk7n3PwtA7J0hhvoOd6m45J3tMQTZ4ukll17GW4jXqpcmw+rbuqztQyoMtJCGtn1RfJlFTRRQj8IQkkQpC9KEDkuuKvnsYmQ6Ec1OWUUj8Wu8NB1eGd31YBvZpXjhhQM=
IronPort-Data: A9a23:2UjqzqqJ45WPGb9BHCAlsqmStdNeBmLbZxIvgKrLsJaIsI4StFCztgarIBmGPKrfa2v3c9F+OYu2oBtTuMSHmNQyQAE4/3s3RCsbpOPIVI+TRqvS04x+DSFioHqKZKzyU/GYRCwPZiKa9kjF3oTJ9yEmjPjRH+SkUoYoBwgoLeNaYHZ54f5cs7ZRbr5A2bBVMivV0T/Ai5S31GyNg1aYBlkpB5er83uDihhdVAQw5TTSbdgT1LPXeuJ84Jg3fcldJFOgKmVY83LTegrN8F251juxExYFENiplPPwdVcHB+WUNgmVgX0QUK+n6vRAjnVtieBga7xNMgEO1mnhc9NZkL2hsbSyQAEkOqTInMwWUgJTFGd1OqguFLrvcCbk6pDKkxOZG5fr67A0ZK0sBqUD8edyKWBD6fJeLyoCBjiZju6x3ru9DPJhg80lJ8joad9Ht29nyS/UEPNgSpfGa6nP7MVTmjY9ms4IGuzRD/f1wxIHgA/oeRZDPBIcD4gz2bzujXjkeDoeo1WQzZfbKlP7lGRZuIUB+vKMEjBSefhoow==
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IronPort-AV: E=Sophos;i="5.87,239,1631577600"; d="scan'208,217";a="963341467"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 16 Nov 2021 17:34:06 +0000
Received: from mail.cisco.com (xbe-aln-003.cisco.com [173.36.7.18]) by rcdn-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id 1AGHY61T012974 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 16 Nov 2021 17:34:06 GMT
Received: from xfe-rcd-005.cisco.com (173.37.227.253) by xbe-aln-003.cisco.com (173.36.7.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Tue, 16 Nov 2021 11:34:06 -0600
Received: from xfe-rcd-004.cisco.com (173.37.227.252) by xfe-rcd-005.cisco.com (173.37.227.253) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Tue, 16 Nov 2021 11:34:06 -0600
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-004.cisco.com (173.37.227.252) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Tue, 16 Nov 2021 11:34:06 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jROPhDw3nHzm51lESaUneV26NSEmHZZIqRrHBrmAi6NPR7pst2LXTgQbrrnZjefDHVHWNzXWpgLet8K4Y32oLyHgc+z3yq1IDC+SdCqn3wr/QCGbJuQoWE06cLHIBEPKVCRq0akJIu7Lo2yCdkOh+Aj+cjC9NkaNeWdI/9YwcnnjsXVcvR9KXHA3M7bkBFhlnPQKw/IZJIVKAkU9N3us/jK1fDE980lCGqMycw+beBN/fN+2wEAZtJwwt1B/NTg7CwFxIq1Bn7bN6pCsV30XKqT5jmr7KEzRn+USGXAvweTrGjBzFzSNBIw/9ZdqbG1VXjKtlK4Vr+Z1dOjUBoD80Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qC/gEiPlCeL6YF4wb3wCmy3cHQnaxYzXgRyDFdKrWFw=; b=F4GXrV/+xt/0f7YBjPbv7PcLsENYE2ENDELOZRyFgxhXkQ9BCqPtAMveEczHSppp4yGv1WY1VhFjcAsuqp6KZzAC2OxGmQNxcSIxNXWmZRrIVo/uKQG8/dEhoypdh9R3FYf6HLb8OHlvoE92SLzsSFfLddVlHLxSJji9M/kVJFFekCV9XXNigrbOQnRQGk0dXPSHL2KamTj/YstmVTTfn6jd8DE6UGCNio6GoiD1F0gfn8bQ2DDeqY765ju/n8ar0gesuzLaumHhUSSPdhwDLz1QgyHheRoOK/N6PnynRTPvnvqL1I97FktJEBpTmepGxKHs2l4jFaiSJiT6BQHw8w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qC/gEiPlCeL6YF4wb3wCmy3cHQnaxYzXgRyDFdKrWFw=; b=OqZe7HvIl+7iz/4auIH1nAFqCABXoIXrhiPSUi0Y96Q2fp34UzU5I/jyKIi+01z6012NUsCa14dkl7rKLWj59QrHhr1XZorp9k6SpC/IZ1Gft1q3nZSN9KOnYgKr+jEAKE2k/1DLXrHPOMMoETK8lj6F6gcqhZBPk/splVNR7d4=
Received: from CO1PR11MB4802.namprd11.prod.outlook.com (2603:10b6:303:96::16) by MW3PR11MB4698.namprd11.prod.outlook.com (2603:10b6:303:5a::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4690.15; Tue, 16 Nov 2021 17:34:02 +0000
Received: from CO1PR11MB4802.namprd11.prod.outlook.com ([fe80::7961:579a:2f83:dc92]) by CO1PR11MB4802.namprd11.prod.outlook.com ([fe80::7961:579a:2f83:dc92%9]) with mapi id 15.20.4713.019; Tue, 16 Nov 2021 17:34:02 +0000
From: "Janelle Allen (janelall)" <janelall@cisco.com>
To: Radovan Semancik <radovan.semancik=40evolveum.com@dmarc.ietf.org>, "scim@ietf.org" <scim@ietf.org>
Thread-Topic: [scim] Discussion Item: Personally Identifiable Information in SCIM
Thread-Index: AQHX1wulHE7XSizfZUWgvBYR/PY/sawBmmAAgABEioCAAWbxgIABGz8wgADo6wCAAIEkgIAApJHE
Date: Tue, 16 Nov 2021 17:34:02 +0000
Message-ID: <CO1PR11MB48025B17198813B3B4F64566CD999@CO1PR11MB4802.namprd11.prod.outlook.com>
References: <CO1PR11MB48024D5296FAF8B347454D1ACD949@CO1PR11MB4802.namprd11.prod.outlook.com> <ed126b67-aff7-0867-2e4b-ec07aed8d366@pdmconsulting.net> <CB1CBE7E-7D17-42E7-AD56-F95F925C6BA0@independentid.com> <5b794493-7fca-3098-65bc-c7ae91ab81f8@pdmconsulting.net> <MW3PR11MB4730EC0A50D149D94FD83D67CD989@MW3PR11MB4730.namprd11.prod.outlook.com> <0330afe6-2273-73e7-912e-0dc569be04b0@pdmconsulting.net> <ca91ec7e-9b24-5ee8-e4de-6e011f40e8bd@evolveum.com>
In-Reply-To: <ca91ec7e-9b24-5ee8-e4de-6e011f40e8bd@evolveum.com>
Accept-Language: en-US
Content-Language: en-CA
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8f1e4d40-91f1-4f57-9444-08d9a92747e9
x-ms-traffictypediagnostic: MW3PR11MB4698:
x-microsoft-antispam-prvs: <MW3PR11MB46982D13336849FD3011E682CD999@MW3PR11MB4698.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4802.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(84040400005)(166002)(6506007)(122000001)(33656002)(53546011)(5660300002)(8936002)(110136005)(38100700002)(30864003)(7696005)(83380400001)(38070700005)(316002)(508600001)(2906002)(26005)(8676002)(55016002)(966005)(186003)(66946007)(9686003)(66446008)(64756008)(66476007)(52536014)(66556008)(71200400001)(76116006)(86362001)(91956017); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR11MB48025B17198813B3B4F64566CD999CO1PR11MB4802namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4802.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8f1e4d40-91f1-4f57-9444-08d9a92747e9
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Nov 2021 17:34:02.2495 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 7BX8qcFRQ5ayE9FjGe0sRB2zPcruM8NOplxbAf6ebo9beQmF7+KLbUDc1nScvXF94bhiy3vUlNn0manV99mxNw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW3PR11MB4698
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.18, xbe-aln-003.cisco.com
X-Outbound-Node: rcdn-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/scim/zuzDXoJvaLiSa56gf1MP6dtd7aM>
Subject: Re: [scim] Discussion Item: Personally Identifiable Information in SCIM
X-BeenThere: scim@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Simple Cloud Identity Management BOF <scim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scim>, <mailto:scim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scim/>
List-Post: <mailto:scim@ietf.org>
List-Help: <mailto:scim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scim>, <mailto:scim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Nov 2021 17:34:32 -0000

Thank you for providing your thoughts based on your valuable experience.


From: scim <scim-bounces@ietf.org> on behalf of Radovan Semancik <radovan.semancik=40evolveum.com@dmarc.ietf.org>
Date: Tuesday, November 16, 2021 at 12:36 AM
To: scim@ietf.org <scim@ietf.org>
Subject: Re: [scim] Discussion Item: Personally Identifiable Information in SCIM

Hello,

The situation is much more complicated that it may seem.

First of all, this issue is not limited to personally-identifiable information (PII), it also applied to personal data (please see our glossary [1] for clarification). In fact, GDPR and similar regulations deal with personal data, not just PII. Therefore it is better to consider personal data instead of PII.

Secondly, it is not very practical to deal with notion of personal data in the schema, especially in a system with considerably static schema definition such as SCIM. Whether a particular information is considered personal data heavily depends on context. E-mail address may be considered personal data (even if it is "corporate"), however if it is alias, distribution list or e-mail address used by automated processing system it probably won't be personal data, as there is no person behind it. Therefore the schema can specify that a particular data item may potentially contain personal data. But that is true for almost any data item, as the user may enter his SSN into a description. Obviously, having a probability of particular item containing a personal data is not very helpful either. Marking personal data in the schema not a way to go. Maybe marking it in metadata for every value? Well, that is quite complicated (e.g. see our data provenance project [2]), and it is even more complicated that it seems, because the other thing below.

Thirdly, knowing that some piece of data is "personal data" does not gives much information regarding its use - and it is use of personal data that matters. Storage and transfer of personal data is important, but ultimately it is the use of that that will get you in trouble. How should the client behave if something is marked as "personal data"? Should consent be requested from user? Or was the consent already given? For what purpose was the consent given? Oh, pardon my French, "consent" is really a dirty word ... so, is there any legal basis for use of the data? What legal basis? What are the constraints for data use? How to deal with data erasure? Those are the questions that matter, and they cannot be answered by simple "PII flag" in the schema.

This problem is not fully understood, not even by the identity management professionals. The technology is not mature enough, e.g. there is obviously a need for a rich value metadata, however, this is not really supported (or even envisioned) by schema languages (including SCIM schema). We are aware of this problem for many years, and last year we have tried to prototype a solution (see [2]). The prototype was quite successful, but it also uncovered hidden complexity ([3]).

SCIM is so not prepared for any of this. Even if a series of precisely-timed miracles happen and this can be somehow handled in SCIM specs, vast majority of SCIM clients will not be prepared for this anyway. And those that are won't agree on data protection metadata schema. This is a very unstable area for experiments and prototypes. It is way too early for standardization.
[1]
https://docs.evolveum.com/glossary/#personally-identifiable-information
https://docs.evolveum.com/glossary/#personal-data

[2]
https://docs.evolveum.com/midpoint/projects/midprivacy/phases/01-data-provenance-prototype/

[3]
https://docs.evolveum.com/midpoint/projects/midprivacy/phases/01-data-provenance-prototype/provenance-origin-basis/


--

Radovan Semancik

Software Architect

evolveum.com


On 16. 11. 2021 0:53, Danny Mayer wrote:

Paulo,

Are those Personal information or Corporate information? If they are personal email addresses, for example, then I would agree, but what about your business email address? The URL you referenced did not differentiate between the two. Most corporate systems only want the business email address and only HR will have a personal email address. If need be we can specify that a personal email address not be part of the SCIM schema while a business email address can. If we can understand what GDPR requires for PII for email addresses the rest of what you referenced will likely be the same. We can have a further discussion after that on the security requirements for any PII. Note that GDPR is not the only requirement for PII. California in the US also has requirements and I know that other non-EU countries also have requirements.

Danny
On 11/15/21 5:24 AM, Paulo Jorge N. Correia (paucorre) wrote:
Danny,
Email address, phone numbers, locations, most of it is consider PII, and the what is even more problematic is when that information travels across clouds.
Many regulations like European GDPR (https://gdpr.eu/eu-gdpr-personal-data/), but not only EU, most of the geos like Canada, Singapore, etc. are creating similar legislations are controlling and monitoring what you do with PII

So I would say that is very very relevant that SCIM have the right mechanisms for the GEOs regulation can by enforce or not.

Of course this will require that some kind of privacy expert (normally Lawyer) to have a look at the RFC schemas and do recommendation if each attribute is consider PII or not.

Thanks,
Paulo

From: scim <scim-bounces@ietf.org><mailto:scim-bounces@ietf.org> On Behalf Of Danny Mayer
Sent: Sunday, November 14, 2021 17:07
To: Phillip Hunt <phil.hunt@independentid.com><mailto:phil.hunt@independentid.com>
Cc: scim@ietf.org<mailto:scim@ietf.org>; Janelle Allen (janelall) <janelall=40cisco.com@dmarc.ietf.org><mailto:janelall=40cisco.com@dmarc.ietf.org>
Subject: Re: [scim] Discussion Item: Personally Identifiable Information in SCIM


None of this answers my basic question of why PII would be a part of SCIM. HR systems (with the exception of a few properties) and Finance systems should not be sharing PII with other systems and a management system (a SCIM client) should not be aware of that information. I can imagine that an expense system, for example, might need some additional information from an HR system (like a physical address) but is that what is needed? The other need might be a payroll system needing Bank information for direct deposit and physical address, but you want that system to act as a direct SCIM client to HR and not go through any other servers for that information.

Does this make sense? Can someone come up with actual use cases to justify PII in SCIM?

Thanks,

Danny
On 11/13/21 2:41 PM, Phillip Hunt wrote:

Just for the group's information, the current SCIM specs do have privacy considerations sections. The confusion may be that back then, privacy considerations was not a top level table of contents items.

Relevant sections in existing drafts are:
RFC7644 Section 7.5 - https://datatracker.ietf.org/doc/html/rfc7644#section-7.5
RFC7643 Section 9 - https://datatracker.ietf.org/doc/html/rfc7643#section-9. This covers both sensitive data (e.g. passwords) as well as discussion on privacy.

Section RFC7644 7.5.2 refers to the case I pointed out in the WG session.  The HTTP POST .search method was designed to avoid passing information in request URIs that may appear in other
systems such as access logs which may be seen as inappropriate.

A compliant service provider implementation that allows searching of PII and sensitive data via GET should normally be returning HTTP status 403 (Forbidden) in response.  While one might argue that information has already been exposed by the client, it doesn’t help to compound the problem by confirming that the infromation requested is correct.

The SCIM POST Search solution I raised was the result of a “compromise” the SCIM WG had to make for PII. The SCIM WG informally raised the concerns with the HTTP WG.
The HTTPbis WG has discussed the problems of searching with HTTP GET many times before.



Julian Reschke presented on the issue in IETF93 (giving a good explanation of the privacy issues):
https://httpwg.org/wg-materials/ietf93/ietf-93-httpbis-search.pdf

Going forwards….

The issue of searching using HTTP GET has re-surfaced again with a proposal for HTTP QUERY:
https://datatracker.ietf.org/doc/draft-ietf-httpbis-safe-method-w-body/

If we end up talking about a SCIMbis effort, we may want to include support for safe query.  This would be fairly straight forward as we can take the body define in our POST search method and simply use the proposed HTTP QUERY method.

Phillip Hunt
@independentid
phil.hunt@independentid.com<mailto:phil.hunt@independentid.com>





On Nov 13, 2021, at 7:36 AM, Danny Mayer <mayer@pdmconsulting.net<mailto:mayer@pdmconsulting.net>> wrote:

On 11/11/21 10:13 AM, Janelle Allen (janelall) wrote:
Hi there,

In the IETF session today, Phil mentioned privacy and the handling of PII.  A lot of legislation has occurred since SCIM 2.0. A question to this WG, should we be revisiting the core schema and marking some attributes as potentially containing PII?

This caused me to ponder should we be thinking of modifying the core schema to identify which attributes may carry PII eg: the complex name attribute has the potential to carry PII,  should we consider adding a new item as a peer to “mutability” such as “containsPII: true/false”?. Or expand on the returned element such as returned: “restrictedPII”? or any other unmentioned method of addressing PII?

I'd like to understand the use case for even providing PII data in SCIM. Most of the data that the SCIM Schemas currently are offering (see RFC7643) are not PII (though maybe ims and photos might be considered PII - Section 4.1.2). Having dealt with HR systems and their API's I know that there is only an extremely limited subset of data that should ever be made available to any outside system and you don't generally want to host it on a management platform if it is PII. I didn't attend the meeting so I don't know what the discussion was about. I personally feel that PII should NOT be made available through SCIM, but I'm willing to be persuaded otherwise as long as PII protections can be defined and required in any resulting document.
Danny
_______________________________________________
scim mailing list
scim@ietf.org<mailto:scim@ietf.org>
https://www.ietf.org/mailman/listinfo/scim





_______________________________________________

scim mailing list

scim@ietf.org<mailto:scim@ietf.org>

https://www.ietf.org/mailman/listinfo/scim



_______________________________________________

scim mailing list

scim@ietf.org<mailto:scim@ietf.org>

https://www.ietf.org/mailman/listinfo/scim



_______________________________________________

scim mailing list

scim@ietf.org<mailto:scim@ietf.org>

https://www.ietf.org/mailman/listinfo/scim