Asynchronous SCIM Profile for Security Event Tokens

Authors

  • Sachin Dixit Solution Architect Stripe Inc, South San Francisco CA
  • Jagdish Jangid Principal Software Engineer Infinera Corp, San Jose, CA.

Keywords:

System for Cross-Domain Identity Management (SCIM), B2B SaaS, Bulk User Provisioning, Enterprise Identity Management.

Abstract

This paper introduces an innovative asynchronous extension to the System for Cross-Domain Identity Management (SCIM) protocol, specifically designed to address critical performance and scalability challenges encountered in Business-to-Business (B2B) and software-as-a-service (SaaS) environments. While SCIM has established itself as a standard for automating the exchange of identity information across various domains, its inherent synchronous nature creates significant bottlenecks during bulk operations and large-scale data migrations. This limitation is particularly detrimental for enterprises requiring rapid provisioning and real-time synchronization of identity data across multiple platforms. To overcome these challenges, the authors propose a novel asyn- chronous processing mechanism that retains SCIM’s core functionalities while enabling efficient handling of high-volume identity operations. Furthermore, the implications for security protocols and risk mitigation strategies are explored, providing practical implementation scenarios and real- world use cases. The research concludes with strategic recommendations for enterprises looking to adopt this asynchronous framework, highlighting its potential to transform identity management practices and meet the growing demands of modern organizational requirements.

Downloads

Published

2024-06-04

How to Cite

Sachin Dixit, & Jagdish Jangid. (2024). Asynchronous SCIM Profile for Security Event Tokens. Journal of Computational Analysis and Applications (JoCAAA), 33(06), 1357–1371. Retrieved from https://eudoxuspress.com/index.php/pub/article/view/1935

Issue

Section

Articles

Similar Articles

<< < 4 5 6 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.