Citrix Secure Developer Spaces™

SCIM Configuration

The Citrix Secure Developer Spaces™ (SDS) platform adheres to the SCIM 2.0 specification. It is used for the automatic provisioning, synchronization, and deprovisioning of users. The SDS platform supports both the /Users and /Groups endpoints.

  • The Users endpoint is used to create, update, and delete users in the SDS platform.
  • The Groups endpoint is used to create, update, and delete groups in the SDS platform. You can then map these groups to organization(s) and/or project(s) within the SDS platform.

Configure the SCIM Provider

A token is required to authorize requests between your SCIM provider of choice and the SDS platform. As an admin, you can obtain the token at: System Configuration → Identity Providers → SCIM Configuration

https://example.strong.network/system_configuration/identity_providers/scim

SCIM Platform

Please ensure that your SCIM provider of choice—such as Microsoft Entra, Okta, or any other SCIM 2.0-compliant provider—includes this token in all API requests, using the following authorization header format:

Authorization: Bearer <token>

Okta

To use Okta, you will need to set these two fields:

  • SCIM connector base URL: https://example.strong.network/scim
  • Unique identifier field for users: userName

It will look similar to:

SCIM Okta Config

Under users you can enable the following options, as desired:

SCIM Okta Config Users

Microsoft Entra

To use Microsoft Entra, you must first congfigure a custom Enterprise Application within your Microsoft Entra tenant.

Add an Enterprise Application

  • Sign in to the Microsoft Entra admin center with at least Cloud Application Administrator permissions.
  • Navigate to Identity > Applications > Enterprise applications > All applications.
  • Select + New application.
  • Select Create your own application.
    • Name: Enter a unique name to identify this application instance.
    • Integration: Select Integrate any other application you don’t find in the gallary (non-gallary)
  • Select Create at the bottom of the pane.

    SCIM Entra

Configure provisioning

Once the application is created, follow these steps to set up the SCIM connection:

  • Navigate to *Identity > Applications > Enterprise applications and select your newly created application.
  • Under the Manage section in the left sidebar, select Provisioning.
  • Click + New configuration
    • Select authenication method: Select Bearer authenication.
    • Tenant URL: Enter your SCIM endpoint URL. For example, https://example.strong.network/scim
    • Secret token: Enter the bearer token provided by your service.
  • Select Test Connection.

Note:

A successful test connection may be required to proceed.

  • Select Save

PingOne

To use PingOne, you will need to set the following fields:

  • SCIM base URL: https://example.strong.network/scim
  • User Filter Expression: Modify “username” by “userName” as well as “Eq” to “eq”

When configuring it should look like:

PingOne Config

When configured the result should be like:

PingOne Configured

PingOne Configured 2

Using OneLogin

To use OneLogin, you will need to set the following fields:

  • SCIM base URL: https://example.strong.network/scim
  • scimusername: Set its value to Email

The configuration should look like:

OneLogin Configured

OneLogin Configured 2

The parameters section should look like:

OneLogin Configured 3

Using Xecurify (miniOrange)

To use Xecurify, you will need to set the following fields:

  • SCIM Base URL: https://example.strong.network/scim
  • userName: Set its value to E-Mail Address

The configuration should look like:

Xecurify Configured

Xecurify Configured 2

Configure the SDS Platform

No additional configuration is needed on the SDS platform. SCIM is enabled by default.

You can renew the token at any time. Please note that renewing the token will invalidate any previously issued tokens.

SCIM Renewal

SCIM Configuration