Closed magne closed 3 years ago
@magne Thank you for your feedback . We will have this reviewed and update the thread.
Do we have any update on this? We're having the same issue.
Sorry, but any news on this subject ?
There is a lot of great product feedback in this doc issue. This is an old issue and there have been known RFC compliance issues. A number of the issues have been resolved and there is work to resolve additional issues. For the issues that have been resolved there is documentation available here: https://docs.microsoft.com/en-us/azure/active-directory/app-provisioning/application-provisioning-config-problem-scim-compatibility#flags-to-alter-the-scim-behavior I made sure to surface the information in this doc issue back to the product team. I will also be updating the referenced article (link above) with the work the product team is currently doing once it is live.
There are several issues here, both with the implementation and documentation:
roles
attribute, it should mention that it needs to be multi-value to support, well, multiple roles.id
anddisplayName
. Although the informal description of the Core User in the SCIM specification (RFC-7643 page 25) states that ... no vocabulary or syntax is specified ..., the schema in the same specification (RFC-7643 page 66) explicitly defines 4 attributes (value
,display
,type
, andprimary
).value
attribute set to the quoted value the way I read the spec.role
in the response so that the Azure AD SCIM client will properly match roles and we don't get PATCH churn?Is there a timeline for fixing PATCH operations? It's been a year (04/03/2019) since you in the documentation state that ... we are working on ... this behavior. Where can we file issues against the Azure AD SCIM provider?
Document Details
⚠ Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.