Teams and Businesses

Automate provisioning in 1Password Business using SCIM

Learn how to set up and use the 1Password SCIM bridge to integrate with your identity provider.

With 1Password Business, you can automate many common administrative tasks using the System for Cross-domain Identity Management (SCIM) bridge. It’s SCIM 2.0 compatible and works with your existing identity provider, like Azure Active Directory or Okta, so you can:

  • Create users and groups, including automated account confirmation
  • Grant and revoke access to groups
  • Suspend and delete users

Set up the SCIM bridge

Before you can deploy the 1Password SCIM bridge, you’ll need an OAuth bearer token and an encrypted scimsession file. To protect your bearer token and scimsession file, clone the scim-examples repository and run the setup script to generate them locally on your own system.

Step 1: Install Docker

The SCIM bridge setup process requires Docker. On your local system, install Docker.

Step 2: Clone the scim-examples repository

All of the scripts and configuration files needed to set up and deploy the SCIM bridge are available in the scim-examples repository on GitHub.

To clone the repository, open your terminal app, switch to the directory where you want to clone the repository, and run the following command:

git clone https://github.com/1Password/scim-examples.git

Step 3: Run the setup script

To begin the setup process, run the included setup script:

./scim-setup.sh

The SCIM bridge will create a group called “Provision Managers”, give it the required permissions for provisioning, and create a new user account in that group.

Make sure you have a separate email address (or an email alias) to use for the new user account. You can’t reuse the email address that you use for your administrator account.

This setup process will:

  1. Ask you to sign in to your administrator account
  2. Create the provision managers group and the provision manager account
  3. Set up the provision manager account
  4. Generate your bearer token and session file

From now on, the provision manager account can be used with the SCIM bridge to provision people.

Important

The scimsession file contains the encrypted credentials for the account you created for provision management. The bearer token and scimsession file combined can be used to sign in to that account. You’ll need to share the bearer token with your identity provider, but it’s important to never share it with anyone else. And never share your scimsession file with anyone at all.

Deploy the SCIM bridge

To make sure the SCIM bridge is secure and accessible, configure your deployment environment:

  • Restrict access to scimsession to the user running the SCIM bridge. Read-only access is sufficient.
  • Use encrypted storage to secure scimsession at rest.
  • Deploy DNS across the infrastructure to reference Redis and the bridge endpoint by fully qualified domain name (FQDN).
  • Configure an API gateway, proxy, or load balancer to terminate TLS for the bridge endpoint.
  • If the SCIM bridge is deployed behind a load balancer, configure it with a private subnet that allows incoming connections from the load balancer on port 3002.

The SCIM bridge writes to standard output (stdout) for easy log collection.

Learn how to configure your deployment environment:

Kubernetes

Docker Compose

Docker Swarm

Connect your identity provider to the SCIM bridge

Because the 1Password SCIM bridge provides a SCIM 2.0-compatible web service that accepts OAuth bearer tokens for authorization, you can use it with a variety of identity providers.

Connect to the TLS-secured API gateway, proxy, or load balancer where you’ve configured the SCIM bridge (for example: https://scim.example.com) and authenticate using your OAuth bearer token.

Learn how to connect your identity provider:

Azure Active Directory

Okta

Get help

If you change the Master Password, Secret Key, or email address for the account you created for provision management, you’ll need to generate a new bearer token and session file.

The 1Password SCIM bridge requires:

  • 1Password Business
  • a deployment environment with:
    • an API gateway, proxy, or load balancer with TLS support
    • Docker or Kubernetes
    • a Redis cache
    • 128 MB of RAM
    • 100 MB of available storage
  • a supported SCIM 2.0-compatible identity provider: Azure Active Directory or Okta

For more information, contact your 1Password Business representative. To get help and share feedback, join the discussion in the 1Password Support forum.

Published: