Before you start your configurations, ensure that your SCIM server supports:
SCIM 2.0 and handles user and group provisioning operations, including create, update, and delete actions
Service account-based authentication for Client ID and Client Secret
To install and configure the SCIM driver:
Log in to the OpenText Core Identity Lifecycle Manager administration console with your admin credentials.
Create a new SCIM driver.
Navigate to the Driver Management section.
Select Driver Configuration.
Click the + sign and search for SCIM.
Expand Tools and click the + sign next to SCIM-Driver for SCIM.
Select the following:
In Select Driver Base Configuration, select SCIM Base ILM and download the missing packages, then click Next.
In Select Mandatory Features, select SCIM Default Package and download missing packages, then click Next.
In Select Optional Features, select only the package names that are required for OpenText Core Identity Lifecycle Manager and OpenText Identity Governance Integration, such as SCIM JSON Package, SCIM ILM IG Integration, and SCIM Default Filter Mapping ILM. Download the missing packages, then click Next.
In Required Package Dependencies, click Next.
In Driver Information, specify the driver name, then click Next.
In Driver Configuration, select Connection > Remote Loader, then click Next.
Set Publisher Options, set Enable Publisher channel to No, then click Next.
Configure connection parameters.
Select Configuration from the left panel.
Set Authentication Method to OAuth2.0.
Select Bearer for OAuth2.0 Token Management.
In the Access Token URL field, specify the access token URL from OpenText Identity Governance.
In the Query Options area:
Type the name as grant_type and value as client_credentials.
Type the name as client_ID and value as the service account client ID.
Delete the issuer.
In the Secret Query Options area:
Type the name as client_secret and the value as the service account client secret.
Delete the refresh token.
In the Header Fields area type:
Name as Accept and value as application/JSON.
Name as Content-Type and value as application/x-www-form-urlencoded.
In the Application Truststore File field:
(Conditional) If OpenText Identity Governance uses https, specify the location of the OpenText Core Identity Lifecycle Manager server where the OpenText Identity Governance CA certificates are mounted.
(Conditional) If OpenText Identity Governance uses http, keep the field blank.
In Schema Settings, select 2.0 as the Schema Options. Type the SCIM Endpoint URL of the OpenText Identity Governance server and the unique identifier. Use the following format:
https://igurl/api/scim/UNIQUE_IDENTITY_SOURCE_ID
Start the driver.
Wait for the SCIM driver to be installed. Then start the driver and wait for the remote loader to start.
Provision users and groups.
Log in to OpenText Core Identity Lifecycle Managerr, then navigate to Administration > Users.
Add a new user.
To add groups, navigate to Administration > Groups.
Add a new group.
To validate whether users and groups are provisioned, log in to OpenText Identity Governance and navigate to Catalog > Identities or Groups.