role assignment via scim

No matches found

  • Version7+, SaaS, Azure, AWS, On-Premise, DEMS, EnterpriseTube, Getting to Know Your VIDIZMO Account and Portal
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Create a Portal
  • Version7+, SaaS, Azure, AWS, DEMS, On-Premise, EnterpriseTube, Delete a Portal in VIDIZMO
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How an Unregistered User Can Join the Portal
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Manager+, Joining or Leaving Another Portal in VIDIZMO
  • EnterpriseTube, Version7+, Contributor+, SaaS, Azure, AWS, On-Premise, Upload Your First Media in VIDIZMO
  • Contributor+, Version7+, DEMS, SaaS, Azure, AWS, On-Premise, Uploading Evidence: A Step-by-Step Guide
  • Viewer+, EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, AWS, Azure, Concept of User Roles in VIDIZMO
  • EnterpriseTube, DEMS, Viewer+, On-Premise, SaaS, AWS, Azure, version10.0+, Understanding Users and Groups
  • Viewer+, Version7+, EnterpriseTube, DEMS, On-Premise, SaaS, AWS, Azure, Efficient Access Rights Management with User Groups
  • EnterpriseTube, DEMS, Viewer+, On-Premise, SaaS, AWS, Azure, version10.0+, Simplifying Bulk Imports of Users and Groups Using CSVs
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, Azure, AWS, On-Premise, Changing User Role
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Editing User Roles in a Portal
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Deleting a User From Your VIDIZMO Portal
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Managing Groups: Create, Edit and Delete
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Add Users to a Group
  • EnterpriseTube, DEMS, SaaS, On-Premise, Azure, AWS, Manager+, version10.0+, How to Add New Users to a Portal
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Complete your VIDIZMO Registration
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Add Users and Groups to a Portal from Account
  • EnterpriseTube, DEMS, On-Premise, SaaS, AWS, Azure, Manager+, version10.0+, How to Bulk Import Users using CSV
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Reset Password for Other Users
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Approve or Reject New Requests
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Enable User Account
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Disable User Account
  • Version7+, DEMS, SaaS, On-Premise, Manager+, Azure, AWS, How to Assign Custom Permissions to a Specific Group
  • DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Authorize Users to Flag Evidence/Case in Portal
  • Version7+, EnterpriseTube, Viewer+, On-Premise, SaaS, AWS, Azure, DEMS, Understanding Single Sign-On
  • EnterpriseTube, DEMS, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, Viewing and Updating User Profile
  • EnterpriseTube, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, Understanding My Media
  • EnterpriseTube, DEMS, Viewer+, SaaS, On-Premise, Azure, AWS, Version7+, How to Change User Password
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Viewer+, How to Reset Your Forgotten Password
  • EnterpriseTube, DEMS, Contributor+, SaaS, On-Premise, Azure, AWS, Version7+, How to Request a New Role
  • EnterpriseTube, DEMS, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, How to Add User Profile Picture
  • EnterpriseTube, DEMS, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, How to Change your Personal Language
  • EnterpriseTube, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, How to View Media Shared with me
  • EnterpriseTube, DEMS, Version7+, Contributor+, SaaS, On-Premise, Azure, AWS, How to View my Uploaded Media
  • EnterpriseTube, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, HOW-TO, How to View my Favorited Media
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, Understanding Media Manager
  • EnterpriseTube, DEMS, Version7+, Contributor+, SaaS, Azure, AWS, On-Premise, How to Upload Multiple Files
  • DEMS, Version7+, SaaS, Azure, AWS, EnterpriseTube, Contributor+, On-Premise, How to Capture or Upload Video Thumbnails
  • EnterpriseTube, DEMS, SaaS, On-Premise, Azure, AWS, Contributor+, Version7+, How to Add Closed Captions
  • EnterpriseTube, Version7+, Moderator+, SaaS, Azure, AWS, How to Setup Media Availability
  • DEMS, EnterpriseTube, SaaS, Version7+, Contributor+, Azure, AWS, On-Premise, How to Save Media as Draft
  • EnterpriseTube, Version7+, Moderator+, SaaS, Azure, AWS, DEMS, How to Publish a Draft
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, DEMS, How to Unpublish Media
  • EnterpriseTube, DEMS, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to Re-upload Media Files
  • EnterpriseTube, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, How to View Media Information
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to Copy Media Across Portals
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Moderator+, How to Copy Link of Media Files
  • Contributor+, SaaS, Azure, AWS, DEMS, Version9+, Copying Evidence Across Portals in Your VIDIZMO Account
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, AWS, Azure, How to Clip Media from Media Manager
  • Version7+, Moderator+, SaaS, Azure, AWS, DEMS, On-Premise, EnterpriseTube, How to Delete Media
  • EnterpriseTube, DEMS, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to Restore Media from Recycle Bin
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Moderator+, Viewer+, How to Download Media Files from Media Manager
  • DEMS, EnterpriseTube, SaaS, On-Premise, AWS, Azure, Version7+, Use Lock In VIDIZMO to Restrict Content Archiving
  • EnterpriseTube, Version7+, Anonymous+, SaaS, On-Premise, Azure, AWS, Understanding Media Library
  • EnterpriseTube, SaaS, On-Premise, Viewer+, Version7+, AWS, Azure, Understanding Search in VIDIZMO
  • Version7+, EnterpriseTube, Moderator+, SaaS, On-Premise, Azure, AWS, How to Search and Filter Content
  • EnterpriseTube, DEMS, Version7+, Moderator+, SaaS, On-Premise, AWS, Azure, How to Moderate Media
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to Moderate Comments
  • EnterpriseTube, Moderator+, SaaS, On-Premise, Azure, AWS, How to Perform Bulk Actions on Comments
  • EnterpriseTube, SaaS, Version7+, Manager+, On-Premise, Azure, AWS, How to Allow Comments and Comment Moderation for a Media
  • EnterpriseTube, DEMS, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to Password-Protect your Media Files
  • EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, Viewer+, Understanding My Library
  • EnterpriseTube, Version7+, Contributor+, SaaS, On-Premise, Azure, AWS, How to Manage My Library
  • EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, DEMS, Understanding Media Settings
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, Understanding Media Activity Logs
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to View and Export Media Activity Logs
  • Media Management, EnterpriseTube, SaaS, On-Premise, Azure, AWS, Version8+, Moderator+, Contributor+, Viewer+, Understanding Media Analytics
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to View Media Analytics
  • Version7+, EnterpriseTube, SaaS, On-Premise, Azure, AWS, Understanding Media Quality of Experience (QoE)
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to View Media Quality of Experience (QoE)
  • Version8+, Viewer+, EnterpriseTube, DEMS, AWS, Azure, SaaS, On-Premise, Limited Sharing with Viewing & Editing Rights
  • Version8+, EnterpriseTube, DEMS, Contributor+, Azure, AWS, On-Premise, SaaS, How to perform Limited Share with Viewing & Editing Rights
  • Viewer+, SaaS, On-Premise, Azure, AWS, EnterpriseTube, DEMS, Version8+, How to Share Portal Content with Users, Groups and External Viewers
  • Version7+, EnterpriseTube, DEMS, Viewer+, On-Premise, SaaS, AWS, Azure, Understanding Media Types and Formats
  • Version7+, Moderator+, SaaS, Azure, AWS, DEMS, EnterpriseTube, Understanding Collection
  • EnterpriseTube, DEMS, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to Create and Manage a Collection
  • Viewer+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, How to Manage Personal Collections and Playlists
  • EnterpriseTube, Version9.2+, AWS, Azure, SaaS, On-Premise, Contributor+, Exploring Content Creation with In-Depth Insights
  • EnterpriseTube, Version9.2+, SaaS, AWS, Azure, On-Premise, Contributor+, How to Create Content in VIDIZMO
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Version9.1+, Understanding Video Interactivity using Studio Space
  • EnterpriseTube, DEMS, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, Version9.1+, Understanding Handouts
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, Version9.1+, How to insert Handout in a Video
  • EnterpriseTube, DEMS, SaaS, On-Premise, Azure, AWS, Version8+, Contributor+, Understanding Video Mosaic
  • Version8+, Azure, AWS, On-Premise, SaaS, Moderator+, DEMS, EnterpriseTube, How to Create Video Mosaic
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to insert HubSpot form in a Video
  • DEMS, SaaS, Azure, AWS, On-Premise, EnterpriseTube, Version9.1+, Understanding Redaction Using Studio Space
  • DEMS, Version9.1+, SaaS, On-Premise, AWS, Azure, Redaction using Studio Space: A Comprehensive Walkthrough
  • DEMS, AWS, Azure, SaaS, On-Premise, Version9.1+, Step-by-Step Guide to Using Redaction Tool in VIDIZMO
  • DEMS, Version9.2+, SaaS, On-Premise, AWS, Azure, Auto Tracking of Custom Objects in Studio Space
  • DEMS, Version9.2+, SaaS, AWS, On-Premise, Manager+, Automatic Detect and Redact PII in Speech
  • DEMS, SaaS, AWS, Version9.2+, On-Premise, How to Automatically Detect and Redact PII in Speech
  • Azure, AWS, SaaS, DEMS, Version9+, On-Premise, Moderator+, EnterpriseTube, Understanding Document Redaction
  • DEMS, Version9+, On-Premise, SaaS, AWS, Azure, How to Perform Document Redaction in VIDIZMO
  • DEMS, SaaS, On-Premise, Azure, AWS, Version8, How to Redact PII From Digital Evidences
  • DEMS, Version9.3+, Azure, AWS, SaaS, On-Premise, EnterpriseTube, Manager+, Utilizing Face Attributes to Apply Redaction in Studio Space
  • DEMS, SaaS, On-Premise, Azure, AWS, Version8, How to Redact Audio from Digital Evidence
  • EnterpriseTube, Version6+, SaaS, Azure, AWS, On-Premise, Moderator+, Understanding Quiz
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, AWS, Azure, How to Create Quiz
  • Version7+, Moderator+, SaaS, Azure, AWS, EnterpriseTube, On-Premise, Understanding Quiz Assessment Reports
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to insert Quiz in a Video
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, Understanding Survey
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to Create a Survey
  • AWS, Azure, SaaS, On-Premise, EnterpriseTube, Version7+, Moderator+, How to insert Survey within Video
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, Understanding Survey Assessment Reports
  • EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, Understanding SCORM
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to import/upload SCORM Course
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Understanding Portal Settings
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Understanding General Settings
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Change Portal Title and Description
  • Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Administrator+, How to Define Organization's About Us Page
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Understanding Homepage Settings
  • Version7+, SaaS, On-Premise, Azure, AWS, EnterpriseTube, Manager+, How to Feature a Portal on Homepage
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, Portal Settings, How to Feature Media on Homepage
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Understanding Categories
  • Version7+, EnterpriseTube, Manager+, SaaS, Azure, AWS, On-Premise, How to Feature a Category
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Customized Branding in VIDIZMO
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, DEMS, Understanding Branding Settings
  • EnterpriseTube, Manager+, SaaS, On-Premise, Azure, AWS, Version7+, How to Customize Portal Branding
  • EnterpriseTube, DEMS, Version7+, Azure, AWS, SaaS, On-Premise, Understanding Multilingual Support in VIDIZMO
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Add, Edit or Delete Configurable Terms using Thesaurus
  • Version7+, EnterpriseTube, Viewer+, SaaS, Azure, AWS, On-Premise, How to Enable/Disable Site Crawlers for your Portal's Content
  • Version7+, EnterpriseTube, Viewer+, SaaS, Azure, AWS, On-Premise, How to Enable Interactive Social Media Sharing for your VIDIZMO Portal's Content
  • Version7+, Manager+, EnterpriseTube, DEMS, Azure, AWS, SaaS, On-Premise, How to Use PNG Font Icons
  • Version7+, Manager+, Azure, AWS, On-Premise, SaaS, EnterpriseTube, DEMS, How to Show, Hide or Rearrange VIDIZMO Widgets
  • Version7+, EnterpriseTube, Manager+, On-Premise, SaaS, AWS, Azure, How to Customize Navigation Menu
  • EnterpriseTube, Version7+, DEMS, On-Premise, SaaS, AWS, Azure, Administrator+, Understanding Domain Options for a Portal
  • Version7+, EnterpriseTube, DEMS, On-Premise, SaaS, AWS, Azure, Administrator+, How to Change Portal URL
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Configure your Portal to use HTTPS only
  • Manager+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Set Custom Domain for a Portal
  • Viewer+, EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, User-Friendly URLs
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to brand Visitor Verification Policy
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Change Language Settings in your Portal
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Upload Portal Favicon
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to design Homepage and Library Header
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Modifying the Background of the Portal
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, DEMS, How to Change Portal Thumbnail and Site Header
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, DEMS, Understanding Library Settings
  • EnterpriseTube, DEMS, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, Understanding Content Moderation
  • Contributor+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Moderation Workflow
  • Version7+, SaaS, On-Premise, Azure, AWS, EnterpriseTube, Manager+, Understanding Anonymous Comments
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Configure and Use Enterprise Tags
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Manage Custom Attributes
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Define Default Publishing Rules for Uploaded Media
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Configure Comments in Portal
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Version9+, How to Configure Portal's Content Moderation Policy
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, AWS, How to Configure Comment Moderation
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Version9+, How to Configure User Generated Content in Portal
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Configure Social Media Sharing in Portal
  • Version7+, EnterpriseTube, DEMS, Viewer+, SaaS, Azure, AWS, On-Premise, How to customize Category count listing on Media Library
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Restrict Users from Accessing Portal
  • Viewer+, Version8+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, How to View and Add Certificate Templates in VIDIZMO
  • Contributor+, EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, DEMS, How to Add a Disclaimer Message on Media Download
  • EnterpriseTube, SaaS, On-Premise, Azure, AWS, Manager+, DEMS, Version7+, How to Set Retention Period for Deleted Content
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How To Comment Anonymously
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Understanding Archive Policy
  • Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Administrator+, How to Define an Archival Policy
  • DEMS, EnterpriseTube, Contributor+, On-Premise, AWS, Azure, SaaS, Version9+, Understanding Custom Upload Media
  • DEMS, EnterpriseTube, Contributor+, On-Premise, AWS, Azure, SaaS, Version9+, How-to Custom Upload Media
  • Version9+, DEMS, SaaS, On-Premise, AWS, Azure, How to Create Custom Patterns
  • EnterpriseTube, Version9.3+, AWS, Manager+, Azure, SaaS, On-Premise, Unveiling the Dynamics of Category Access Rights in VIDIZMO
  • AWS, Azure, SaaS, On-Premise, Version9.3+, Manager+, EnterpriseTube, Managing Categories in VIDIZMO
  • EnterpriseTube, Version9.3+, AWS, SaaS, On-Premise, Azure, Manger+, How To Brand a Category
  • Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, How to Enable GDPR in VIDIZMO Portal
  • Version7+, EnterpriseTube, Administrator, SaaS, Azure, AWS, On-Premise, How to Define Portal's Terms of Use
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Define a Privacy Policy
  • Version7+, EnterpriseTube, DEMS, Viewer+, On-Premise, SaaS, AWS, Azure, How to Design a User Access Form
  • Version7+, Manager+, Azure, AWS, On-Premise, SaaS, EnterpriseTube, How to Manage Anonymous User Policy
  • EnterpriseTube, DEMS, Version7+, Viewer+, VIDIZMO Password Policy
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Understanding VIDIZMO Integrated Apps
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Version9.1+, Getting Acquainted with the Account in VIDIZMO Portal
  • EnterpriseTube, DEMS, Manager+, SaaS, On-Premise, Azure, AWS, Version7+, Version9.1+, Managing Organization Details in VIDIZMO Portal
  • Version7+, EnterpriseTube, DEMS, Viewer+, SaaS, Azure, AWS, On-Premise, Understanding Consumption based Billing
  • Version7+, EnterpriseTube, DEMS, Manager+, SaaS, Azure, AWS, Consumption Reports for SaaS Deployment Overview
  • Version7+, EnterpriseTube, DEMS, Manager+, SaaS, Azure, AWS, On-Premise, How to View, Filter and Extract Consumption Reports
  • Version7+, EnterpriseTube, DEMS, Viewer+, SaaS, Azure, AWS, On-Premise, How to Configure Thresholds for Consumption Alerts
  • SaaS, EnterpriseTube, DEMS, Version9+, Azure, AWS, Viewer+, On-Premise, Understanding VIDIZMO's ElasticSearch
  • Azure, AWS, SaaS, EnterpriseTube, DEMS, Manager+, Version9+, On-Premise, How to Enable ElasticSearch in VIDIZMO
  • Version7+, Manager+, SaaS, On-Premise, Azure, AWS, EnterpriseTube, DEMS, Understanding Portal's Security
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Manager+, Administrator+, Understanding Portal's Security Policy
  • EnterpriseTube, DEMS, Version9.1+, SaaS, Azure, AWS, On-Premise, Manager+, Enhancing Security and Control with Restricted File Extensions
  • EnterpriseTube, SaaS, On-Premise, Azure, AWS, version10.0+, DEMS, Manager+, Managing Media Embedding in VIDIZMO
  • EnterpriseTube, DEMS, Mangaer+, SaaS, Azure, AWS, On-Premise, Version9.1+, Configuring Restricted File Extensions for Enhanced Content Security
  • EnterpriseTube, DEMS, Version9.1+, SaaS, On-Premise, AWS, Azure, Manager+, Enhancing Security with Custom Headers in VIDIZMO
  • SaaS, AWS, Azure, On-Premise, Version9.1+, EnterpriseTube, DEMS, How to Use Custom Headers for Enhanced Security in VIDIZMO
  • DEMS, EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Understanding Administrative Audit Logs
  • SaaS, EnterpriseTube, DEMS, Version9+, AWS, Azure, Manager+, Understanding Whitelisted Email Domains
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, DEMS, How to Set Default Viewing Access Settings for Portal
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Change Approval Settings for Join Request
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Setup Portal for Anonymous Public Access
  • EnterpriseTube, SaaS, On-Premise, Azure, AWS, DEM, Version7+, Administrator+, How to Hide Portal from Non-Members
  • EnterpriseTube, SaaS, On-Premise, Azure, AWS, Version7+, Manager+, How to Restrict Commenting for Portal Users
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Add Custom Field to the Join Portal Form
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Manager+, How To Configure Join Request Option
  • Manager+, SaaS, On-Premise, Azure, AWS, EnterpriseTube, DEMS, Version7+, How to Set Login Timeout
  • SaaS, EnterpriseTube, DEMS, Version9+, Azure, AWS, Manager+, How to Whitelist Email Domains
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to View and Export Audit Log
  • DEMS, EnterpriseTube, Version7+, SaaS, Manager+, On-Premise, Azure, AWS, Understanding Encoding Providers in VIDIZMO
  • Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Administrator+, Understanding Encoding Profiles in VIDIZMO
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to View Encoding Status
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Add an Encoding Profile
  • EnterpriseTube, DEMS, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, How to Manage Encoding Profiles
  • Version7+, EnterpriseTube, DEMS, Viewer+, On-Premise, How to Customize Encoding Profiles in VIDIZMO On-Premise Encoder
  • Version7+, EnterpriseTube, DEMS, SaaS, Azure, How to View and Edit Configured VIDIZMO Cloud Encoder
  • Version7+, EnterpriseTube, DEMS, SaaS, Azure, How to View and Edit Configured Azure Media Services (AMS) Encoder
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Enable Multiple Download Renditions (Enabling Encoding Profile)
  • EnterpriseTube, DEMS, SaaS, On-Premise, Azure, AWS, How to enable AMS Machine Generated Transcriptions in VIDIZMO
  • AWS, EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, How to View and Edit Configured AWS Elemental MediaConvert Encoder
  • DEMS, Manager+, Azure, AWS, On-Premise, SaaS, Version9.2+, EnterpriseTube, Smart Encoding for Enhanced Media Performance in VIDIZMO
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to View Access Rights and Permissions for every User Role in a Portal
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, DEMS, Understanding Storage Providers in VIDIZMO
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, On-Premise, SaaS, AWS, Azure, Data Storage Options In VIDIZMO
  • Viewer+, EnterpriseTube, DEMS, SaaS, On-Premise, Azure, AWS, Version7+, Storage Providers Comparison
  • Version7+, EnterpriseTube, DEMS, Viewer+, SaaS, Azure, AWS, On-Premise, Understanding Content Encryption in VIDIZMO
  • Version7+, EnterpriseTube, DEMS, Viewer+, SaaS, Azure, On-Premise, Understanding Azure Storage in VIDIZMO
  • Version7+, EnterpriseTube, DEMS, Not-Applicable, SaaS, Azure, How to View and Edit Azure Storage Provider
  • Version7+, EnterpriseTube, DEMS, Not-Applicable, SaaS, Azure, How to View and Edit Azure Media Services (AMS) Storage Provider
  • Version7+, Manager+, EnterpriseTube, SaaS, On-Premise, Azure, DEMS, How to View and Edit Local VIDIZMO Storage Provider
  • Manager+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Configure VIDIZMO Storage Locally on your Web Server
  • Version7+, EnterpriseTube, DEMS, Azure, On-Premise, Administrator+, How to Configure Azure Storage with VIDIZMO On Premise Encoder
  • Version7+, EnterpriseTube, DEMS, Viewer+, SaaS, AWS, On-Premise, Understanding AWS Storage and Encoding in VIDIZMO
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, AWS, How to View and Edit AWS Storage Provider
  • EnterpriseTube, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, How to View and Edit Wowza Storage Provider
  • Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, Administrator+, How to Configure Wowza CDN with Azure Blob
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Understanding Email Templates & SMTP
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, On-Premise, SaaS, AWS, Azure, Understanding Email Templates in VIDIZMO
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Configure Email Templates
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Configure SMTP Settings for Sending Emails
  • Viewer+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, DEMS, Understanding Workflows
  • EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, Viewer+, DEMS, How to View Workflows
  • EnterpriseTube, Version7+, DEMS, Viewer+, On-Premise, SaaS, AWS, Azure, Understanding Locations
  • Viewer+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, Understanding VIDIZMO ECDN
  • Version7+, EnterpriseTube, DEMS, Viewer+, On-Premise, SaaS, AWS, Azure, Understanding Location Restriction
  • EnterpriseTube, Version7+, DEMS, Manager+, On-Premise, SaaS, AWS, Azure, How to Define Locations in a Portal
  • Manager+, EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, DEMS, How to Restrict Specific Locations from Accessing Content
  • Manager+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, How to Configure ECDN Node using General Streaming Server Provider
  • Manager+, Version7+, EnterpriseTube, On-Premise, How to Configure ECDN Node using Wowza On-premise Streaming Server Provider
  • EnterpriseTube, Manager+, SaaS, On-Premise, AWS, Azure, Version7+, How to Configure ECDN Node using Wowza Cloud Streaming Server Provider
  • Manager+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, How to Configure ECDN Node using VIDIZMO Streaming Server Provider
  • Manager+, EnterpriseTube, Version7+, SaaS, On-Premise, AWS, DEMS, Understanding Setup Wizard
  • Manager+, EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, DEMS, How to Run Setup Wizard - Configuring Storage and Transcoding Provider for your Portal
  • Version7+, EnterpriseTube, DEMS, Administrator, SaaS, Azure, On-Premise, How to Configure Azure Media Services (AMS) Storage with AMS Standard Encoder using Setup Wizard
  • Version7+, EnterpriseTube, DEMS, SaaS, Azure, On-Premise, Administrator+, How to Configure Azure Storage with VIDIZMO Cloud Encoder
  • Version7+, EnterpriseTube, DEMS, Administrator, Azure, On-Premise, How to Configure VIDIZMO Storage with VIDIZMO On-Premise Encoder
  • Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, Administrator+, How to Configure VIDIZMO Storage with VIDIZMO Cloud Encoder
  • Version7+, EnterpriseTube, On-Premise, Administrator+, How to Configure Wowza Storage with VIDIZMO On Premise Encoder using Setup Wizard
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Manager+, Understanding Digital Rights Management (DRM) in VIDIZMO
  • EnterpriseTube, Version7+, DEMS, On-Premise, SaaS, AWS, Azure, Administrator+, How to Enable DRM in Portal
  • EnterpriseTube, DEMS, Version9.2+, Azure, SaaS, On-Premise, AWS, Manager+, Configuring Azure CDN with SAS for Enhanced Content Security
  • DEMS, Version9.3+, SaaS, AWS, On-Premise, Manager+, EnterpriseTube, Comprehending AWS Private Bucket: Enhancing Data Security and Privacy with VIDIZMO
  • Version9.3+, SaaS, On-Premise, AWS, Manager+, EnterpriseTube, DEMS, How To Configure AWS S3 Private Bucket in VIDIZMO
  • Concepts, Viewer+, Storage, EnterpriseTube, DEMS, AWS, SaaS, version7, How to configure AWS Storage and MediaConvert in VIDIZMO
  • Viewer+, Version7+, EnterpriseTube, DEMS, On-Premise, Understanding Content Formats
  • Manager+, Version7+, EnterpriseTube, DEMS, On-Premise, How to Manage Content Formats
  • EnterpriseTube, Control Panel, Version7+, DEMS, On-Premise, Administrator+, How to Update Application Configuration Keys in VIDIZMO
  • Manager+, Version7+, EnterpriseTube, DEMS, On-Premise, How to Update User Settings using Application Configuration Keys in VIDIZMO
  • EnterpriseTube, DEMS, On-Premise, Manager+, Version7+, How to Update General Settings using Application Configuration Keys in VIDIZMO
  • Manager+, Version7+, EnterpriseTube, DEMS, On-Premise, How to Update Security Settings using Application Configuration Keys in VIDIZMO
  • EnterpriseTube, Manager+, Version7+, On-Premise, How to Update Chat Settings using Application Configuration Keys in VIDIZMO
  • EnterpriseTube, Manager+, Version7+, DEMS, On-Premise, How to Update Date and Time Settings using Application Configuration Keys in VIDIZMO
  • EnterpriseTube, Manager+, Version7+, DEMS, On-Premise, How to Update Notifications Settings using Application Configuration Keys in VIDIZMO
  • EnterpriseTube, Version7+, Manager+, On-Premise, DEMS, How to Update Scheduled Tasks using Application Configuration Keys in VIDIZMO
  • Manager+, Version7+, EnterpriseTube, DEMS, On-Premise, Azure, How to Update Storage and Transcoding Settings using Application Configuration Keys in VIDIZMO
  • EnterpriseTube, Manager+, Version7+, DEMS, On-Premise, How to Update Upload Settings using Application Configuration Keys in VIDIZMO
  • Manager+, Version7+, EnterpriseTube, DEMS, On-Premise, How to Update Cache Server Settings using Application Configuration Keys in VIDIZMO
  • Manager+, Version7+, EnterpriseTube, DEMS, On-Premise, Understanding Language Editor
  • Manager+, Version7+, EnterpriseTube, DEMS, On-Premise, How to Edit Resources using Language Editor
  • Manager+, Version7+, EnterpriseTube, DEMS, On-Premise, Understanding Control Panel Dashboard
  • get started, Control Panel, Administrator, Version7+, EnterpriseTube, DEMS, On-Premise, How to View and Update VIDIZMO License
  • Version7+, EnterpriseTube, Manager+, On-Premise, How to Update Refresh Rate of Analytics and QoE Reports
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Video Insights using Azure Media Analyzer
  • Moderator+, EnterpriseTube, DEMS, SaaS, Azure, AWS, Version7+, On-Premise, Understanding On-demand AI Processing
  • AWS, EnterpriseTube, DEMS, Version7+, Not Applicable, SaaS, On-Premise, Understanding Video Insights using Amazon Web Services (AWS)
  • Azure, Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, AWS, On-Premise, Understanding Containerized Cognitive Services with VIDIZMO
  • EnterpriseTube, DEMS, Moderator+, SaaS, On-Premise, Azure, AWS, Version8+, Understanding Automatic License Plate Recognition (ALPR)
  • EnterpriseTube, DEMS, Moderator+, SaaS, On-Premise, Azure, AWS, Version8+, Understanding Automatic Weapon Detection
  • EnterpriseTube, DEMS, Moderator+, SaaS, On-Premise, Azure, AWS, Version8+, Understanding Automatic Vehicle Detection
  • Version8+, DEMS, SaaS, Contributor+, Version7+, Version9+, Understanding Automatic Person Detection and Tracker
  • Viewer+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version9+, viewer7+, Understanding OCR (Optical Character Recognition) Apps in VIDIZMO
  • Version8+, EnterpriseTube, DEMS, SaaS, On-Premise, Azure, AWS, Moderator+, Understanding VIDIZMO OCR
  • EnterpriseTube, DEMS, Contributor+, SaaS, On-Premise, Azure, AWS, Version8+, Version9+, How to Perform OCR using VIDIZMO Indexer
  • EVCM, DEMS, AWS, On-Premise, SaaS, Manger+, version10.0+, Multi-Language Audio Recognition and Transcription in VIDIZMO
  • AWS, version10.0+, SaaS, On-Premise, Manager+, EnterpriseTube, DEMS, Multi-Language Audio Transcription with On-Demand Processing
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Document Processing
  • SaaS, On-Premise, Azure, AWS, Version7+, EnterpriseTube, DEMS, Manager+, Understanding Image Processing
  • EnterpriseTube, Moderator+, SaaS, On-Premise, Azure, AWS, Version8+, Understanding Reports Dashboard
  • EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, Manager+, How to filter and Extract Reports from Report Dashboard
  • EnterpriseTube, DEMS, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, Understanding Playback Page
  • EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, Viewer+, How to Like/Dislike Media
  • EnterpriseTube, SaaS, On-Premise, Azure, AWS, Version7+, Viewer+, How to Comment on Media
  • EnterpriseTube, Viewer+, SaaS, On-Premise, Azure, AWS, Version7+, Managing Favorites: Adding, Viewing, and Removing Media
  • EnterpriseTube, Viewer+, SaaS, On-Premise, Azure, AWS, Version7+, How to View Related Media
  • EnterpriseTube, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Download Media from Playback Page
  • EnterpriseTube, DEMS, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, How to Share Media to Viewers via Email
  • EnterpriseTube, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, Sharing Media on Social Media Platforms and Sending via Email to External Users
  • EnterpriseTube, DEMS, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, Viewing Password Protected Media
  • EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, Viewer+, How to Report Media
  • EnterpriseTube, Version7+, Contributor+, SaaS, On-Premise, Azure, AWS, Understanding Playlist
  • EnterpriseTube, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, Understanding Playlist Playback
  • EnterpriseTube, Version7+, Contributor+, SaaS, On-Premise, Azure, AWS, Version9+, Creating and Managing VIDIZMO Playlists
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to Delete a Playlist
  • EnterpriseTube, DEMS, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, Playback, Understanding Transcription Pane in VIDIZMO
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Transcription Templates in VIDIZMO
  • Templates, Transcription, Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to View and Add Transcription Templates in VIDIZMO
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to View, Edit and Download Transcript of a Media
  • EnterpriseTube, DEMS, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, Understanding Image Viewer in VIDIZMO
  • EnterpriseTube, DEMS, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, Understanding Document Viewer in VIDIZMO
  • DEMS, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, EnterpriseTube, How to Enable and View Video Insights
  • DEMS, SaaS, On-Premise, Azure, AWS, Version9.3+, EnterpriseTube, Face Attribute Prediction: An In-Depth Explanation
  • DEMS, EVCM, Version9+, SaaS, On-Premise, AWS, Azure, How to Generate Face Attribute Insights in VIDIZMO
  • DEMS, SaaS, On-Premise, Azure, AWS, Version9.3+, EnterpriseTube, Manager+, An In-Depth Understanding of Activity Recognition in VIDIZMO
  • DEMS, EnterpriseTube, Version9.3+, SaaS, On-Premise, Manager+, Azure, AWS, How to Generate Activity Insights in VIDIZMO
  • version10.0+, SaaS, AWS, On-Premise, Azure, EnterpriseTube, DEMS, Detection Of Personal Protective Equipment(PPE) in VIDIZMO
  • EnterpriseTube, DEMS, version10.0+, AWS, Azure, SaaS, Manager+, How to Detect PPE in VIDIZMO
  • DEMS, On-Premise, SaaS, Azure, AWS, version10.0+, EnterpriseTube, How to Generate Insights using VIDIZMO Audio Indexer
  • Viewer+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, DEMS, Understanding Player Templates
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Customized Branding for Player
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Add, Edit or Delete a Player Template
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Change Default Player Template
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Annotations
  • DEMS, EnterpriseTube, Version7+, Viewer+, SaaS, On-Premise, Azure, AWS, Frame-by-Frame Analysis of a Video
  • Viewer+, Version8+, EnterpriseTube, SaaS, Azure, On-Premise, Understanding Certificate Templates in VIDIZMO
  • Manager+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, Version9+, Understanding Live Streaming in VIDIZMO
  • SaaS, Azure, On-Premise, AWS, EnterpriseTube, Version9.1+, Manager+, Wowza Streaming Engine: Exploring Live Streaming Workflows
  • Viewer+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, version7, Understanding Live Streaming using Wowza Streaming Cloud
  • Version9.1+, Azure, On-Premise, SaaS, AWS, EnterpriseTube, How To Conduct Live Streams On Vidizmo Using OBS Studio
  • EnterpriseTube, Viewer+, Version7+, SaaS, Azure, AWS, On-Premise, Understanding Live Streaming using Wowza Streaming Engine
  • Viewer+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, Understanding Live Control Room
  • EnterpriseTube, Version7+, Manager+, On-Premise, SaaS, AWS, Azure, How to Set Up Publishing Point for Live Streaming using Wowza Cloud Streaming Server
  • EnterpriseTube, Version9.1+, Manager+, SaaS, Azure, AWS, On-Premise, Setting Up Publishing Point for Live Streaming using Wowza on Premise Streaming Server
  • Manager+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, How to Set Up Publishing Point for Live Streaming using Wowza On Premise Streaming Server
  • Manager+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, How to Set Up Publishing Point for Live Streaming using General Streaming Server
  • EnterpriseTube, Version7+, Moderator+, SaaS, On-Premise, Azure, AWS, How to Enable and View Interactivity Options in a Live Session
  • Viewer+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, How to Publish a Quiz during a Live Stream
  • Viewer+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, How to Publish a Survey during a Live Stream
  • EnterpriseTube, Control Panel, Version7+, Manager+, On-Premise, SaaS, Azure, How to Configure Live Chat Application using Azure Service Bus
  • EnterpriseTube, Version7+, Moderator+, On-Premise, SaaS, AWS, Azure, How to Conduct a Live Webcast in VIDIZMO
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, Get Started with Digital Evidence Management System -DEMS
  • Version7+, Azure, AWS, On-Premise, SaaS, DEMS, Understanding VIDIZMO's Information Architecture
  • DEMS, Version8+, AWS, Azure, SaaS, On-Premise, Understanding Folders in DEMS
  • DEMS, Version7+, SaaS, On-Premise, Azure, AWS, How to Create and Delete a Case
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, How to Inspect an Evidence
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, How to Approve or Reject an Evidence under Review
  • DEMS, Version7+, SaaS, On-Premise, Azure, AWS, How to Manage a Case
  • DEMS, SaaS, On-Premise, AWS, Azure, Version8+, How to move an Evidence or Case from one Folder to another
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, How to move an Evidence or Case from one Category to Another
  • DEMS, Version7+, SaaS, On-Premise, Azure, AWS, How to view Evidence Chain of Custody
  • DEMS, Azure, AWS, On-Premise, SaaS, Version7+, How to view Case Chain of Custody
  • DEMS, Version8+, AWS, Azure, SaaS, On-Premise, How to Create & Manage Folders in DEM
  • DEMS, Azure, SaaS, AWS, On-Premise, Version9+, Understanding ZIP File Support in VIDIZMO
  • DEMS, Version9+, AWS, Azure, On-Premise, How to Upload and Extract ZIP File in VIDIZMO
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, How to set Disposition Policy of an Evidence
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, How to Restore an Evidence from Disposal
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, How to View Evidences and Cases Assigned to me
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, How to Inspect a Case
  • DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Understanding Evidence Repository
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Chain of Custody
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Geo-Spatial Data within Videos
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, How to Export Geo-Spatial Data from within Videos recorded using Drones
  • Viewer+, Version7+, DEMS, SaaS, Azure, AWS, On-Premise, How to Analyze Geospatial Data in Videos Recorded Using Drones
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Evidence Tamper Detection
  • DEMS, Version7+, SaaS, On-Premise, Azure, AWS, How to Detect if an Evidence has been Tampered
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Roles and Permissions in DEM
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Alert Generation Policy for Sensitive Evidence and Cases
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, Understanding Log Access Levels
  • Version7+, DEMS, SaaS, Azure, On-Premise, Understanding Reason Provisioning on Access of Evidence or Cases
  • DEMS, Version7+, SaaS, On-Premise, Azure, AWS, How to Enable Content Tamper Detection App
  • SaaS, Azure, AWS, On-Premise, DEMS, How to Subscribe to Alerts on Flagged (Sensitive) Evidence Files
  • Version7+, DEMS, SaaS, Azure, AWS, On-Premise, How to Enable and Assign Log Access Level
  • Version7+, EnterpriseTube, DEMS, Viewer+, SaaS, Azure, AWS, On-Premise, How Components in Azure Media Services Integrate With VIDIZMO
  • Not-Applicable, EnterpriseTube, DEMS, On-Premise, AWS, SaaS, Version7+, How to use Mashup Filter Widget
  • Not-Applicable, EnterpriseTube, DEMS, On-Premise, AWS, Azure, SaaS, Version7+, How to generate Authentication Token to enable use of VIDIZMO Widgets on your Site
  • Manager+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Setup SSO using ADFS
  • AWS, DEMS, Manager+, SaaS, On-Premise, EnterpriseTube, version10.0+, How to Configure AWS Indexer App
  • Version8+, EnterpriseTube, DEMS, On-Premise, Configure SCIM Provisioning with Azure AD VIDIZMO on Premise Deployment - Disconnected Environment
  • Azure, EnterpriseTube, Version7+, DEMS, Viewer+, On-Premise, SaaS, How to Setup SSO using Azure Active Directory
  • Azure, Not-Applicable, DEMS, SaaS, EnterpriseTube, How to Configure Azure Cognitive Services for VIDIZMO
  • EnterpriseTube, DEMS, Manager+, Version8+, Deployment, Azure, AWS, On-Premise, How to Configure Video Insights in VIDIZMO Portal using ARM-based Azure Media Analyzer
  • Manager+, Version7+, EnterpriseTube, SaaS, DEMS, Azure, AWS, On-Premise, How to Configure Video Insights in VIDIZMO Portal using Azure Media Analyzer Classic
  • DEMS, EnterpriseTube, Version9.1+, Azure, SaaS, On-Premise, Configuring Azure Video Analyzer ARM in the VIDIZMO Portal
  • DEMS, Version9.3+, Manger+, AWS, SaaS, On-Premise, Ingesting Content from an AWS S3 Bucket in VIDIZMO
  • DEMS, Version9.3+, Manager+, AWS, SaaS, On-Premise, Ingesting Content from an AWS S3 Bucket in VIDIZMO
  • EVCM, Version9.3+, AWS, Manager+, Azure, SaaS, On-Premise, EnterpriseTube, Ingesting Content from Kaltura to VIDIZMO
  • EnterpriseTube, Version9.3+, SaaS, Azure, On-Premise, AWS, Manager+, How to Ingest Content from Kaltura in VIDIZMO
  • Manager+, EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, How to Setup Tracking App using Google Analytics
  • Viewer+, Version7+, DEMS, SaaS, Azure, AWS, On-Premise, Understanding VIDIZMO-BlueJeans Integration
  • Manager+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Integrate BlueJeans with VIDIZMO
  • Deployment, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Administrator+, How to Configure Freshdesk Live Chat App in Portal
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, AWS, Azure, Contributor+, How to Configure Freshdesk Support App in Portal
  • Manager+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Setup SSO using Forgerock
  • EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Manager+, Version7+, Understanding Microsoft Teams Integration in VIDIZMO
  • Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, Manager+, How to Integrate MS Teams with VIDIZMO
  • DEMS, EVCM, SaaS, Azure, AWS, EnterpriseTube, Version9+, Understanding Multi-Factor Authentication (MFA) Apps
  • SaaS, EnterpriseTube, DEMS, Manager+, AWS, Azure, Version9+, How to enable Email OTP App in VIDIZMO
  • DEMS, Viewer+, SaaS, Azure, AWS, EnterpriseTube, Version9+, How to use Email OTP App in VIDIZMO
  • EnterpriseTube, Version7+, DEMS, On-Premise, SaaS, AWS, Azure, How to Setup SSO using OneLogin
  • EnterpriseTube, Version7+, On-Premise, SaaS, AWS, Azure, DEMS, Sign in using OneLogin
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Setup SSO using Okta
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, Azure, On-Premise, AWS, Integrate, Sign in using Okta
  • SaaS, Azure, AWS, Version9+, Manager+, DEMS, Understanding Partner App in VIDIZMO
  • SaaS, Version9+, Manager+, Azure, AWS, HOW-TO, DEMS, How to Configure Partner App in VIDIZMO
  • Manager+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to configure SSO using Ping Identity
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, How to Configure Rules for Automatic Role Assignment using SCIM
  • Version7+, EnterpriseTube, DEMS, Manager+, SaaS, Azure, AWS, On-Premise, How to Configure SCIM Provisioning using Azure AD
  • Version7+, EnterpriseTube, DEMS, Viewer+, SaaS, Azure, AWS, On-Premise, How to Configure SCIM Provisioning using Okta
  • EnterpriseTube, DEMS, Version7+, Manager+, SaaS, On-Premise, Azure, AWS, Understanding Human Transcription in VIDIZMO
  • Manager+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Configure Human Transcription in VIDIZMO Portal using Rev
  • Manager+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Setup SAML-P SSO using ADFS
  • Version7+, EnterpriseTube, DEMS, Administrator, SaaS, Azure, AWS, On-Premise, How to Setup SAML-P SSO using Okta
  • Manager+, Version7+, EnterpriseTube, DEMS, Azure, AWS, On-Premise, SaaS, Understanding VIDIZMO for SharePoint App
  • Manager+, Version7+, SaaS, Azure, AWS, On-Premise, DEMS, How to Install and Configure VIDIZMO App for SharePoint
  • EnterpriseTube, Version7+, On-Premise, SaaS, AWS, Azure, Viewer+, How to Setup SSO using Facebook
  • EnterpriseTube, Version7+, Viewer+, On-Premise, SaaS, AWS, Azure, Sign in using Facebook
  • EnterpriseTube, Version7+, DEMS, Viewer+, On-Premise, SaaS, AWS, Azure, How to Setup SSO using Google
  • EnterpriseTube, Single Sign-On, Version7+, DEMS, Viewer+, On-Premise, SaaS, AWS, Azure, Sign in using Google
  • EnterpriseTube, Version7+, AWS, Azure, SaaS, On-Premise, Viewer+, How to Setup SSO using LinkedIn
  • EnterpriseTube, DEMS, Viewer+, On-Premise, SaaS, AWS, Azure, Sign in using LinkedIn
  • Version7+, EnterpriseTube, Viewer+, On-Premise, SaaS, AWS, Azure, How to Setup SSO using Twitter
  • EnterpriseTube, Version7+, On-Premise, SaaS, AWS, Azure, Viewer+, Sign in using Twitter
  • EnterpriseTube, DEMS, Viewer+, On-Premise, SaaS, AWS, Azure, Version7+, How to Setup SSO using Microsoft Live ID
  • EnterpriseTube, Version7+, Viewer+, On-Premise, SaaS, AWS, Azure, DEMS, Sign in using Microsoft Account
  • DEMS, Version8+, Manager+, Azure, AWS, SaaS, Understanding VIDIZMO - Thomson Reuters Case Center Integration
  • DEMS, Version8+, Manager+, AWS, Azure, SaaS, How to Use Thomson Reuters Case Center App in VIDIZMO
  • HOW-TO, Integrations, Portal Settings, setup wizard, Manager+, Version8+, DEMS, SaaS, Azure, AWS, How to Integrate Thomson Reuters Case Center App with VIDIZMO
  • Manager+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version9.3+, Configuring VIDIZMO Indexer for Object Detection
  • Manager+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, How to Setup Tracking App using Woopra
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to install VIDIZMO from Zoom App Marketplace
  • Manager+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, DEMS, Understanding VIDIZMO-Zoom JWT Integration
  • Version9+, SaaS, EnterpriseTube, DEMS, Azure, AWS, Manager+, Understanding VIDIZMO-Zoom Server-to-Server OAuth App Integration
  • Manager+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Integrate Zoom JWT with VIDIZMO
  • EnterpriseTube, Version9+, SaaS, AWS, Azure, Manager+, How to create ZOOM Server-to-Server OAuth App in ZOOM Marketplace
  • SaaS, AWS, EnterpriseTube, DEMS, Azure, Manager+, Version9+, How to Configure ZOOM Server-to-Server OAuth App in VIDIZMO
  • On-Premise, SaaS, AWS, Azure, version10.0+, DEMS, EnterpriseTube, Understanding the Concepts of VIDIZMO Audio Indexer
  • DEMS, version10.0+, SaaS, On-Premise, AWS, Azure, EnterpriseTube, Configuring VIDIZMO Audio Indexer for Insights
  • DEMS, EnterpriseTube, Version9+, Prerequisites for VIDIZMO Application
  • Administrator, Version7+, EnterpriseTube, DEMS, Azure, AWS, On-Premise, Version8+, Version9+, Prerequisites for installation of VIDIZMO Application in an On-Premise/Private Cloud Environment
  • Version7+, EnterpriseTube, DEMS, Administrator, SaaS, Azure, AWS, On-Premise, How to Install VIDIZMO Application On-Premise/Private Cloud Environment
  • Administrator, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Setup VIDIZMO Encoding Server
  • Administrator, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Setup an Application Server for VIDIZMO Installation
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, VIDIZMO License Activation
  • DEMS, Version9+, SaaS, On-Premise, AWS, Azure, EnterpriseTube, Design and Architecture Overview
  • DEMS, EnterpriseTube, version10.0+, Azure, On-Premise, SaaS, Exploring Event-Driven Architecture with Azure Service Bus in VIDIZMO
  • DEMS, EnterpriseTube, version10.0+, AWS, Azure, On-Premise, SaaS, Understanding and Configuring Kafka as a Broker Service in VIDIZMO
  • Version7+, Not-Applicable, Azure, AWS, On-Premise, SaaS, DEMS, EnterpriseTube, Deploy VIDIZMO Upgrade
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, On-Premise, Azure file share with VIDIZMO on-premise encoder - Content Storage
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Deploy VIDIZMO - V8 Prerequisites and Deployment Considerations
  • Not-Applicable, Version8+, DEMS, EnterpriseTube, SaaS, Azure, AWS, On-Premise, Deploy VIDIZMO - V8 Design and Architecture Overview
  • Version8+, Not-Applicable, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Deploy VIDIZMO - V8 Event-Driven Architecture with Azure Service Bus
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, On-Premise, Deploy VIDIZMO - On-premises and Dedicated Cloud Environments
  • Azure, DEMS, EnterpriseTube, Version7+, VIDIZMO Storage and Encoding Provider with Azure Media Service
  • VIDIZMO Event Driven Architecture with RabbitMQ
  • Version7+, EnterpriseTube, DEMS, Not-Applicable, On-Premise, Deploy VIDIZMO V7 - On-premise Environment
  • AWS, AWS Deployment, Version7+, EnterpriseTube, DEMS, Viewer+, SaaS, Deployment of VIDIZMO in AWS Cloud
  • Version7+, DEMS, EnterpriseTube, Azure, AWS, On-Premise, Administrator, VIDIZMO Deployment Options (On-Premise & Dedicated Cloud)
  • Azure, Not-Applicable, EnterpriseTube, DEMS, Version7+, SaaS, Deploying VIDIZMO in Microsoft Azure Cloud
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, AWS, On-Premise, Azure, On-Premise, Dual Server VIDIZMO Deployment
  • On-Premise, Dual Server VIDIZMO Deployment with Network Storage and Streaming Server
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How To Setup High Availability With VIDIZMO On-Premises/Private Cloud
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, On-Premise Dual Server HA VIDIZMO Deployment with Network Storage
  • EnterpriseTube, DEMS, Version7+, On-Premise, On-Premise Dual Server HA VIDIZMO Deployment with Network Storage and Streaming Server
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, On-Premise Dual Server HA Deployment with Network Storage and VIDIZMO ECDN for Caching
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Deploying VIDIZMO In Microsoft Azure Cloud (HA+DR)
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to setup VIDIZMO Virtual Machine (VM) on Azure Marketplace
  • AWS, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, How to purchase VIDIZMO App on AWS Marketplace
  • Not-Applicable, Version7+, DEMS, SaaS, Azure, On-Premise, How to setup VIDIZMO Digital Evidence Management Virtual Machine on Azure Marketplace
  • Not-Applicable, EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, AWS, Azure, VIDIZMO Maintenance Methodology
  • Not Applicable, EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Different Levels Of Security Layers Available In VIDIZMO
  • Not-Applicable, EnterpriseTube, DEMS, SaaS, On-Premise, Azure, AWS, Version7+, Infrastructure Hardening Policy
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Configure Web Application Firewall (WAF) for VIDIZMO
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, On-Premise, SaaS, AWS, Azure, Understanding Desktop Client for VIDIZMO
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to Download and Install VIDIZMO Desktop Application
  • Version9+, DEMS, EnterpriseTube, SaaS, On-Premise, AWS, Azure, Watch Folders in VIDIZMO: An In-Depth Exploration
  • Version9+, SaaS, On-Premise, AWS, Azure, EnterpriseTube, DEMS, A Comprehensive Guide to Watch Folders in VIDIZMO
  • EnterpriseTube, Version7+, SaaS, On-Premise, Azure, AWS, Version9.1+, VIDIZMO Offline Playback: Understanding and Step-by-Step Guide
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Understanding GDPR Compliance for Data Processing
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, Azure, AWS, Understanding FIPS 140-2 Compliance
  • Version7+, EnterpriseTube, DEMS, Viewer+, SaaS, Azure, AWS, On-Premise, VIDIZMO Accessibility Conformance Report
  • EnterpriseTube, DEMS, SaaS, On-Premise, Azure, AWS, Version7+, Introduction to Security Patches and VIDIZMO’s Security Patching Policy
  • Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Administrator, How to export or delete personal data under GDPR Compliance
  • EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, AWS, Azure, VIDIZMO Compliance with Minimum Security Requirements in FIPS 200
  • DEMS, version10.0+, SaaS, Azure, AWS, On-Premise, VIDIZMO Compliance with CJIS Security Policy Resource Center
  • DEMS, EnterpriseTube, Azure, AWS, SaaS, On-Premise, version10.0+, ​VIDIZMO Compliance with NIST SP 800-53
  • DEMS, EnterpriseTube, SaaS, On-Premise, AWS, Azure, version10.0+, VIDIZMO Compliance with NIST FIPS 199 and SP 800-60 for Security Categorization
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Security Assessment - Overview
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Incident Report 072321 - X-Frame header not set
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Incident Report 071021 - Vulnerability Analysis
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Incident Report 071021 - Infrastructure Analysis
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Incident Report 06032101 - Vulnerability Analysis
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Incident Report 121321 - Service Interruption
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, VIDIZMO's Statement on Log4J Vulnerability
  • EnterpriseTube, DEMS, version10.0+, AWS, Azure, SaaS, On-Premise, Version 10.0.300
  • EnterpriseTube, DEMS, AWS, Azure, SaaS, On-Premise, Version9.3+, Version 9.3.290
  • SaaS, On-Premise, AWS, Azure, Version9.3+, EnterpriseTube, DEMS, Version 9.3.292
  • SaaS, EnterpriseTube, DEMS, On-Premise, AWS, Azure, Version9.3+, Version 9.3.296
  • DEMS, EnterpriseTube, Version9.2+, AWS, Azure, On-Premise, SaaS, Version 9.2.285
  • EnterpriseTube, DEMS, Version9.2+, SaaS, On-Premise, AWS, Azure, Version 9.2.286
  • SaaS, On-Premise, DEMS, EnterpriseTube, AWS, Azure, Version9.2+, Version 9.2.288
  • Azure, AWS, SaaS, On-Premise, DEMS, EnterpriseTube, Version9+, Version 9.1.278
  • DEMS, EnterpriseTube, Version9+, On-Premise, AWS, SaaS, Azure, Version 9.1.279
  • DEMS, EnterpriseTube, Version9.1+, SaaS, On-Premise, AWS, Azure, Version 9.1.280
  • DEMS, EnterpriseTube, Version9.1+, SaaS, On-Premise, AWS, Azure, Version 9.1.281
  • DEMS, EnterpriseTube, Version9.1+, SaaS, On-Premise, AWS, Azure, Version 9.1.283
  • DEMS, EnterpriseTube, Version9+, SaaS, Azure, AWS, On-Premise, Version 9.0.274
  • Version9+, Version 9.0.275
  • Version9+, Version 9.0.276
  • Version8+, EnterpriseTube, DEMS, Version 8.3.272
  • Version8+, EnterpriseTube, DEMS, Version 8.3.271
  • Version8+, Version 8.3.270
  • Version8+, Version 8.3.268
  • Version8+, Version 8.3.266
  • Version8+, Version 8.3.265
  • Version8+, Version 8.3.264
  • Version8+, Version 8.3.262
  • Version8+, Version 8.3.261
  • Version8+, Version 8.3.260
  • Version8+, Version 8.3.259
  • Version8+, Version 8.2.258
  • Version8+, Version 8.2.257
  • Version8+, Version 8.1.256
  • Version8+, Version 8.1.255
  • Version8+, Version 8.1.254
  • Version8+, Version 8.1.253
  • Version8+, Version 8.1.252
  • Version8+, Version 8.1.251
  • Version8+, Version 8.1.250
  • Version8+, Version 8.1.249
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.1.248
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.1.247
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.1.246
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.1.245
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.1.244
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.1.243
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.1.242
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.1.241
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.0.240
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.0.239
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.0.238
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.0.237
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.0.236
  • Not-Applicable, Version8+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.0.235
  • Version8+, Not-Applicable, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 8.0.234
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.3.228
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.3.224
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.3.222
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.3.221
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.3.219
  • Release Notes, Bug Fixes, Improvements, Not-Applicable, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.3.218
  • Release Notes, Improvements, Bug Fixes, Not Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, On-Premise, AWS, Version 7.3.216
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.2.215
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.2.214
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.2.213
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.1.212
  • Release Notes, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.1.209
  • Release Notes, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.1.205
  • Release Notes, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.1.204
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.1.203
  • Release Notes, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.0.202
  • Release Notes, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.0.201
  • Release Notes, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.0.200
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.0.199
  • Release Notes, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.0.198
  • Release Notes, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.0.197
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.0.196
  • Release Notes, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, AWS, On-Premise, Azure, Version 7.0.195
  • Release Notes, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 7.0.194
  • Not-Applicable, Version6+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 6.7.4
  • Bug Fixes, Improvements, Product Change Logs, Product Updates, Release Notes, What's New, Not-Applicable, Version6+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 6.6.1
  • Not-Applicable, Version6+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 6.6.0
  • Product Change Logs, Product Updates, Release Notes, Updates, Version Release, Version Update, Not-Applicable, Version6+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 6.5.4
  • Bug Fixes, Improvements, Product Change Logs, Product Updates, Release Notes, Version Release, Version Update, Not-Applicable, Version6+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 6.5.2
  • Product Change Logs, Product Updates, Release Notes, Version Release, Feature Announcement, Not-Applicable, Version6+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 6.5.1
  • Product Change Logs, Product Updates, Release Notes, Version Release, Not-Applicable, Version6+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 6.4.6
  • Bug Fixes, Product Change Logs, Product Updates, Release Notes, What's New, Version Release, Version 6.4.5
  • EnterpriseTube Premium, Product Change Logs, Product Updates, Release Notes, Not-Applicable, Version6+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Version 6.4.3
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Getting Started
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, On-Premise, AWS, Authentication
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Media Library - Gallery View
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, Azure, AWS, On-Premise, Media Library - Detail View
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Collage
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Carousel
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Video Player
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Audio Player
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Insights
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Transcription
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Maps
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Collection Player
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Image Player
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Document player
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Survey Player
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Quiz Player
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Wrapper - Most Popular Media
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Wrapper - Most Recent Media
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Wrapper - Most Viewed Media
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Scenario - Playback Media from Media Library
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Playlist Player
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, API Reference Guide - MashupInfo Object
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, API Reference Guide - TenantInfo Object
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, API Reference Guide - CommentInfo Object
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, API Reference Guide - UserProfileInfo Object
  • Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Not-Applicable, API Reference Guide - TagInfo Object
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, API Reference Guide - ContentInfo Object
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, API Reference Guide - InsightInfo Object
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, API Reference Guide - LiveChatInfo Object
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, API Reference Guide - PlayerTemplateInfo Object
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, API Reference Guide - TimedDataInfo Object
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, API Reference Guide - LearningPlanInfo Object
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, API Reference Guide - CategoryInfo Object
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, VIDIZMO REST API Reference Guide
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Choose the right VIDIZMO APIs for Integration with your Platform
  • Version9+, AWS, Azure, On-Premise, EnterpriseTube, Using REST API – User Authentication
  • EnterpriseTube, Version9+, aws encoder, Azure, On-Premise, Using REST API - Uploading Content
  • EnterpriseTube, Version9+, Azure, AWS, On-Premise, Using REST API - Update Mashup with Custom Attributes
  • EnterpriseTube, Version9+, AWS, Azure, On-Premise, Using REST API - Content Processing
  • EnterpriseTube, Version9+, AWS, Azure, On-Premise, Using REST API - Search Mashup
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Understanding REST API Request/Response Structure
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Using REST API - Fetch User Profile using Email Address
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Using REST API - Acquire Access Token for Authentication
  • Not-Applicable, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, Using REST API - Integrating Recorded Lecture Sessions on your own LMS Portal
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Using REST API - Integrating Video Analytics within CRM for Marketing Campaigns
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, How to add Authentication App for Password less API Authentication
  • Version8+, EnterpriseTube, DEMS, Administrator, SaaS, Azure, AWS, On-Premise, VIDIZMO Webhooks Reference Guide
  • Version8+, EnterpriseTube, DEMS, Administrator, SaaS, Azure, AWS, On-Premise, Webhooks Payloads - Media Metadata
  • Version8+, EnterpriseTube, DEMS, Administrator, SaaS, Azure, AWS, On-Premise, Webhooks Payloads - Media Actions
  • Version8+, EnterpriseTube, DEMS, Viewer+, SaaS, Azure, AWS, On-Premise, Webhooks Payloads - Media Updated
  • Version8+, EnterpriseTube, DEMS, Viewer+, SaaS, Azure, AWS, On-Premise, Webhooks Payloads - Live Session
  • Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, Azure, On-Premise, Understanding VIDIZMO Webhooks
  • Developer Guide, Webhooks, Reference Guide, Manager+, Integration, EnterpriseTube, DEMS, Version8+, SaaS, On-Premise, AWS, Azure, How To Create VIDIZMO Webhook App
  • Version7+, EnterpriseTube, DEMS, Administrator, SaaS, Azure, AWS, On-Premise, Accessing VIDIZMO Desktop Client Logs
  • Version7+, EnterpriseTube, DEMS, Administrator, SaaS, Azure, AWS, On-Premise, How to Install Updates Manually in Mac / Windows for VIDIZMO Desktop Application
  • Version7+, EnterpriseTube, DEMS, Administrator, SaaS, Azure, AWS, On-Premise, Links not working in Desktop Application
  • Not-Applicable, EnterpriseTube, DEMS, Version7+, SaaS, On-Premise, AWS, Azure, Users Cannot Be Added Or Have Their Roles Changed
  • Manager+, Version7+, EnterpriseTube, DEMS, On-Premise, SaaS, AWS, Azure, Account Limitation For Sending Emails
  • EnterpriseTube, DEMS, Not-Applicable, Version7+, Azure, AWS, SaaS, On-Premise, How To Monitor VIDIZMO Streaming Server's QoS
  • Azure, Not-Applicable, Version7+, EnterpriseTube, DEMS, SaaS, AWS, On-Premise, Troubleshooting Web Application Firewall (WAF) Configuration Issues
  • Viewer+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, Troubleshoot Zoom Integration Issues
  • Manager+, Version7+, EnterpriseTube, SaaS, Azure, AWS, On-Premise, Troubleshoot Live Stream Connection Issues
  • Version7+, EnterpriseTube, DEMS, Administrator, SaaS, Azure, AWS, On-Premise, Embed Media with Single Sign-On Using Azure AD
  • Viewer+, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Thumbnail Capture and Processing of an Image Failed
  • Version7+, EnterpriseTube, DEMS, Manager+, SaaS, Azure, AWS, On-Premise, Email Templates Variables Transformation
  • Administrator, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Can not find path C\VIDIZMO\Cache\ContentFiles - configuring Wowza storage using Setup Wizard
  • Administrator, Version7+, EnterpriseTube, DEMS, SaaS, Azure, AWS, On-Premise, Error Response: Access to path denied - configuring Wowza Storage using Setup Wizard

How to Configure Rules for Automatic Role Assignment using SCIM

role assignment via scim

  • Deployment:

System for Cross-Domain Identity Management (SCIM) is an open standard protocol used to automate the exchange of user and group information between Identity providers and Enterprises. SCIM ensures that users added to the Identity Management System should have their accounts automatically created in VIDIZMO when they are provisioned from the Identity Provider. User attributes and profiles are synchronized between the two systems while the updates and removal of users is based on the user status in Identity Management System. 

In VIDIZMO, a large number of users can be provisioned through Identity Providers which has to be given a role that is a kind of a security policy which determines what access permissions a user and a group has to perform a specific task. Hence, while configuring SCIM settings users will be able to set rules determining the targeted role. This will help enterprises to assign specific roles to large organizational groups without manually assigning a role to each user. 

Steps to Add New Rules 

I.  From the Portal's Home Page:

1. Click on the Admin Tab to expand it.

2. Navigate to the Portal Settings.

role assignment via scim

II. On the Portal Settings page:

1. Click on the Apps option on the left to expand it. 

2. Further click on the Provisioning  option.

3. Locate to the any of the SCIM-supported Identity Provider Apps and click on the Settings icon at the right hand side. 

role assignment via scim

III. On the SCIM settings page:

1. Click on the  Add New Rules option.

2. Select the Attribute Path. 

3. Select any one of the Condition that you want to set for the rule being created. 

4. Provide a Matching text in response to the condition you have selected above. 

5. Select the  Targeted Role  that you want to set for the users belonging to the groups qualifying the above conditions. 

role assignment via scim

Limitations and Considerations

  • The Attribute path that is supported in VIDIZMO is for Group's Display Name  only. 
  • User will be able to create multiple rules. However, if multiple conflicting rules are created, for example, a user belonging to two different groups in AD/OKTA, then the first rule would be applied. 
  • If the multiple rules are created and a group consisting of numerous users is provisioned from an Identity Provider, then the process may take a little longer than usual. 

How to Configure SCIM Provisioning using Azure AD

How to Configure SCIM Provisioning using Okta

Did you find it helpful? Yes No

Related Articles

Table of contents.

Article views count

Provisioning users and groups with SCIM using the REST API

You can manage the lifecycle of your enterprise's user accounts on GitHub.com from your identity provider (IdP) using GitHub's REST API for System for Cross-domain Identity Management (SCIM).

Who can use this feature?

To manage users in your enterprise with your identity provider, your enterprise must be enabled for Enterprise Managed Users, which is available with GitHub Enterprise Cloud. For more information, see " About Enterprise Managed Users ."

In this article

  • Support for provisioning users with GitHub's public SCIM schema is in public beta and subject to change.
  • GitHub recommends that you test provisioning in an environment that's isolated from the production data on your IdP and GitHub.com.

About IAM for Enterprise Managed Users

If your enterprise on GitHub is created for Enterprise Managed Users, you must configure an external identity management system to provision and maintain user accounts. Your identity management system must offer the following functionality:

  • Security Assertion Markup Language (SAML) 2.0
  • OpenID Connect (OIDC), which is only supported if you use Microsoft Entra ID (previously known as Azure AD)
  • User lifecycle management with System for Cross-domain Identity Management (SCIM)

When you configure authentication and provisioning for your enterprise, you can either use a partner IdP, or you can use another combination of identity management systems.

Using a partner identity provider

Using other identity management systems.

Each partner IdP provides a "paved-path" application, which implements both SSO and user lifecycle management. To simplify your configuration of Enterprise Managed Users, GitHub recommends that you use a partner IdP's application for both authentication and provisioning. For more information and a list of partner IdPs, see " About Enterprise Managed Users ."

When you use a single partner IdP for both authentication and provisioning, GitHub provides support for the application on the partner IdP, as well as the IdPs' integration with GitHub Enterprise Cloud.

For more information about configuring SCIM provisioning using a partner IdP, see " Configuring SCIM provisioning for Enterprise Managed Users ."

If you cannot use a partner IdP for both authentication and provisioning due to migration overhead, licensing costs, or organizational inertia, you can use another identity management system or combination of systems. The systems must provide authentication using SAML and user lifecycle management using SCIM, and must adhere to GitHub's integration guidelines.

GitHub has not tested integration with every identity management system. While integration with Enterprise Managed Users may be possible, GitHub's support team may not be able to assist you with issues related to these systems. If you need help with an identity management system that's not a partner IdP, or if you use a partner IdP only for SAML authentication, you must consult the system's documentation, support team, or other resources.

Prerequisites

When you began using GitHub Enterprise Cloud, you must have chosen to create an enterprise with managed users. For more information, see " Choosing an enterprise type for GitHub Enterprise Cloud ."

Before you configure provisioning, you must configure authentication for your users. This configuration requires setup on both your identity management system and GitHub Enterprise Cloud. For more information, see " Configuring authentication for Enterprise Managed Users ."

To provision users and groups with GitHub's REST API, your identity management system must support the SCIM 2.0 standard. For more information, see the following RFCs on the IETF website.

  • RFC 7642: Definitions, Overview, Concepts, and Requirements
  • RFC 7643: Core Schema
  • RFC 7644: Protocol

You must enable an open SCIM configuration for your enterprise. For more information, see " Configuring SCIM provisioning for Enterprise Managed Users ."

To authenticate requests to the REST API endpoints for SCIM, you must use a personal access token (classic) associated with your enterprise's setup user. The token requires the admin:enterprise scope. GitHub recommends that you do not configure an expiration date for the token. For more information, see " Configuring SCIM provisioning for Enterprise Managed Users ."

The user records for the systems that you use for authentication and provisioning must share a unique identifier and satisfy GitHub's matching criteria. For more information, see " REST API endpoints for SCIM " in the REST API documentation.

Best practices for SCIM provisioning with GitHub's REST API

When you configure your identity management system to provision users or groups of users on GitHub Enterprise Cloud, GitHub strongly recommends that you adhere to the following guidelines.

Ensure your identity management system is the only source of write operations

Send valid requests to rest api endpoints, provision users before you provision groups, validate access for groups on github enterprise cloud, understand rate limits for github enterprise cloud, configure audit log streaming.

To ensure that your environment has a single source of truth, you should only programmatically write to the REST API for SCIM provisioning from your identity management system. GitHub strongly recommends that only one system sends POST , PUT , PATCH , or DELETE requests to the API.

However, you can safely retrieve information from GitHub's APIs with GET requests in scripts or ad hoc requests by an enterprise owner.

Warning: If you use a partner IdP for SCIM provisioning, the application on the IdP must be the only system that makes write requests to the API. If you make ad hoc requests using the POST , PUT , PATCH , or DELETE methods, subsequent synchronization attempts will fail, and provisioning won't function properly for your enterprise.

GitHub's REST API endpoints for provisioning users with SCIM require well-formed requests. Bear in mind the following guidelines:

  • Requests that don't match the API's expectations will return a 400 Bad Request error.
  • REST API endpoints for provisioning users with SCIM require a User-Agent header. GitHub Enterprise Cloud will reject requests without this header.

SCIM groups are effective for the management of user access at scale. For example, you can use groups on your identity management system to manage team and organization membership on GitHub Enterprise Cloud.

To manage team membership with groups on your identity management system, you must sequentially complete the following steps:

  • Provision user accounts on GitHub Enterprise Cloud.
  • Provision a group on GitHub Enterprise Cloud.
  • Update the membership of the group on your identity management system.
  • Create a team on GitHub Enterprise Cloud that's mapped to the group on your identity management system.

If you manage access using groups on your identity management system, you can validate that users get the access you intend. You can use the REST API to compare your system's group memberships with GitHub's understanding of those groups. For more information, see " REST API endpoints for external groups " and " REST API endpoints for teams " in the REST API documentation.

To ensure the availability and reliability of the platform, GitHub implements rate limits. For more information, see " Rate limits for the REST API ."

Without considering rate limits, large enterprises onboarding with Enterprise Managed Users for the first time are likely to exceed the limits. To avoid exceeding the rate limit on GitHub Enterprise Cloud, do not assign more than 1,000 users per hour to the SCIM integration on your IdP. If you use groups to assign users to the IdP application, do not add more than 1,000 users to each group per hour. If you exceed these thresholds, attempts to provision users may fail with a "rate limit" error. You can review your IdP logs to confirm if attempted SCIM provisioning or push operations failed due to a rate limit error. The response to a failed provisioning attempt will depend on the IdP.

The audit log for your enterprise displays details about activity in your enterprise. You can use the audit log to support your configuration of SCIM. For more information, see " About the audit log for your enterprise ."

Due to the volume of events in this log, GitHub retains the data for 180 days. To ensure that you don't lose audit log data, and to view more granular activity in the audit log, GitHub recommends that you configure audit log streaming. When you stream the audit log, you can optionally choose to stream events for API requests, including requests to REST API endpoints for SCIM provisioning. For more information, see " Streaming the audit log for your enterprise ."

Provisioning users with the REST API

To provision, list, or manage users, make requests to the following REST API endpoints. You can read about the associated API endpoints in the REST API documentation and see code examples, and you can review audit log events associated with each request.

Before a person with an identity on your identity management system can sign in to your enterprise, you must create the corresponding user. Your enterprise doesn't require an available license to provision a new user account.

  • For an overview of the supported attributes for users, see " SCIM " in the REST API documentation.
  • You can view provisioned users in the web UI for GitHub Enterprise Cloud. For more information, see " Viewing people in your enterprise ."

Soft-deprovisioning users with the REST API

To prevent a user from signing in to access your enterprise, you can soft-deprovision the user by sending a PUT or PATCH request to update a user's active field to false to /scim/v2/enterprises/{enterprise}/Users/{scim_user_id} . When you soft-deprovision a user, GitHub Enterprise Cloud obfuscates the user record's login and email fields, and the user is suspended.

When you soft-deprovision a user, the external_identity.update event does not appear in the audit log. The following events appear in the audit log:

  • user.suspend
  • user.remove_email
  • user.rename
  • external_identity.deprovision

You can view all suspended users for your enterprise. For more information, see " Viewing people in your enterprise ."

Reactivating users with the REST API

To allow a soft-deprovisioned user to sign in to access your enterprise, unsuspend the user by sending a PUT or PATCH request to /scim/v2/enterprises/{enterprise}/Users/{scim_user_id} that updates the user's active field to true .

When you reactivate a user, the external_identity.update event does not appear in the audit log. The following events appear in the audit log:

  • user.unsuspend
  • external_identity.provision

Hard-deprovisioning users with the REST API

To completely delete a user, you can hard-deprovision the user by sending a DELETE request to /scim/v2/enterprises/{enterprise}/Users/{scim_user_id} . Your enterprise will retain any resources and comments created by the user.

When you hard-deprovision a user, the following events occur:

  • The user record's login and email fields are obfuscated.
  • The user's display name is set to an empty string.
  • GitHub Enterprise Cloud deletes all of the user's SCIM attributes, emails, SSH keys, personal access tokens, and GPG keys.
  • The user's account on GitHub Enterprise Cloud is suspended, and authentication to sign in to the account will fail.

To reprovision the user, you must use the POST method to create a new user. The new user can reuse the deprovisioned user's login . If the email addresses of the hard-deprovisioned user and the new user match, GitHub Enterprise Cloud will attribute existing Git commits associated with the email address to the new user. Existing resources and comments created by the original user will not be associated with the new user.

Provisioning groups with the REST API

To control access to repositories in your enterprise, you can use groups on your identity management system to control organization and team membership for users in your enterprise. You can read about the associated API endpoints in the REST API documentation and see code examples, and you can review audit log events associated with each request.

While your enterprise doesn't require an available license to provision a new user account, if you provision a group that results in the addition of users to an organization, you must have available licenses for those users. If your enterprise only uses Visual Studio subscriptions with GitHub Enterprise, the associated user must be assigned to a subscriber. For more information, see " About Visual Studio subscriptions with GitHub Enterprise ."

  • For an overview of the supported attributes for groups, see " SCIM " in the REST API documentation.
  • For an overview of audit log events related to groups, see " Audit log events for your enterprise ."
  • You can view provisioned groups in the web UI for GitHub Enterprise Cloud. For more information, see " Managing team memberships with identity provider groups ."

Additional audit log events for changes to IdP groups

If you update the members of an existing group using a PUT or PATCH request to /scim/v2/enterprises/{enterprise}/Groups/{scim_group_id} , GitHub Enterprise Cloud may add the user to the organization or remove the user from the organization depending on the user's current organization membership. If the user is already a member of at least one team in the organization, the user is a member of the organization. If the user is not a member of any teams in the organization, the user may also not already be a member of the organization.

If your request updates a group linked to a team in an organization where a user is not already a member, in addition to external_group.update , the following events appear in the audit log:

  • org.add_member
  • If the request adds a user to a group that's linked to a team in an organization where the user is not already a member, org.add_member
  • If the request adds the user to a group that's linked to a team in an organization, team.add_member

If your request updates a group linked to a team in an organization where a user is already a member, in addition to external_group.update , the following events appear in the audit log:

  • If the request removes the user from a group that's linked to a team in an organization, and the team is not the last team in the organization where the user is a member, team.remove_member
  • If the request removes a user from a group that's linked to the last team in an organization where the user is already a member, org.remove_member

Migrating to a new SCIM provider

After you configure SCIM provisioning for your enterprise, you may need to migrate to a new SCIM provider. For more information, see " Migrating your enterprise to a new identity provider or tenant ."

Troubleshooting SCIM provisioning

If GitHub is rate-limiting your requests to the REST API, you can learn more in " About rate limits ."

If you enable audit log streaming and stream events for API requests, you can review any requests to the REST API endpoints for SCIM provisioning by filtering for events from the EnterpriseUsersScim or EnterpriseGroupsScim controllers.

If a SCIM request fails and you're unable to determine the cause, check the status of your identity management system to ensure that services were available. Additionally, check GitHub's status page. For more information, see " About GitHub Support ."

If a request to provision a user fails with a 400 error, and the error message in your identity management system's log indicates issues with account ownership or username formatting, review " Username considerations for external authentication ."

After successful authentication, GitHub Enterprise Cloud links the user who authenticated to an identity provisioned by SCIM. The unique identifiers for authentication and provisioning must match. For more information, see " REST API endpoints for SCIM ." You can also view this mapping on GitHub.com. See " Viewing and managing a user's SAML access to your enterprise ."

If you manage access using groups on your identity management system, you can troubleshoot using the REST API or web UI for GitHub Enterprise Cloud.

  • You can use the REST API to compare your identity management system's group memberships with GitHub's understanding of those groups. See " REST API endpoints for external groups " and " REST API endpoints for teams ."
  • For more information about troubleshooting using the web UI, see " Troubleshooting team membership with identity provider groups ."

For additional troubleshooting suggestions, see " Troubleshooting identity and access management for your enterprise ."

Managing Users and Groups with SCIM in the JFrog Platform

Yaniv Malka

By Yaniv Malka May 4, 2021

SCIM Support in the JFrog Platform 863x300

When your organization becomes bigger, managing the users and groups lifecycle becomes a significant challenge. Your company grows rapidly, hiring new employees, and giving them access to more and more applications that your organization uses. This means that there are many employee-related actions that need to be taken when an employee changes their team, role, leaves temporarily or permanently (otherwise you may end up with operational, security or compliance issues).

As such, there are many situations in which you may need to revoke that employee’s access to certain applications for security and compliance reasons. This process becomes  time-consuming and error-prone when your organization uses many external services, and has a lot of users. In Artifactory, you’ll find it useful to create or delete users and groups, disable users, and revoke Access Tokens and API keys when the user is disabled.

Your DevOps teams will be happy to learn that identity access security for cloud-based applications and service just got a lot easier with the addition of the SCIM v2.0 protocol and schema to the JFrog Platform .

Read more about Scaling Software Supply Chains Securely >

S ystem for C ross domain I dentity M anagement (SCIM) , is an open standard protocol, which allows you to provision and manage your users and groups across systems. The JFrog implementation of SCIM protocol provides the core of SCIM v2.0 specification. SCIM implementation relies on REST endpoints conforming with the SCIM schema, and allows you to create, delete, disable users and groups, associate between groups and users, and many other actions that can be performed through your Identity Provider ( IdP ). Your IT department can manage your JFrog users and groups using Identity Provider such as Okta or Azure Active Directory . This will reduce the painful and time-consuming process of managing users across multiple applications.

System For Cross-Domain Identity Management

SCIM protocol improves your company security and compliance position, since all user management is concentrated in one place, access to applications will be disabled/enabled easily with a click of a button, and your IT department will save a lot of time and effort.

Because JFrog is an integral part of the DevOps world, we implemented the SCIM v2.0 protocol into our Platform, so that our customers can enjoy the ease of managing their users and groups using their preferred IdP.

This blog post will show how simple it is to configure your IdP (Okta in this case), create a user, and disable their activity. In 3 easy steps!

Step 1: Generate Access Admin Token

First, you will want to generate an Access Admin Token, which you will use to authenticate the communication with your JFrog Platform application. When logged in as Administrator, go to Identity and Access > Access Tokens > Generate Admin Token .

Generate Admin Token

Copy the Access Admin Token that you created because you will need it to configure SCIM with Okta.

Step 2: Configure SCIM with Okta

In Okta , go to Applications > click Create New App . A popup modal will appear, you probably want to choose SAML 2.0 for the sign on method , as it integrates naturally with SCIM.

Choose a name for your app, and click Next.

Choose a name for your app

Note: Follow these instructions to optionally configure SAML SSO with Okta.

Go to General tab, and choose SCIM in the Provisioning options, and click Save .

choose SCIM in the Provisioning options

A new Provisioning tab will appear; open it and click Edit .

Fill in the fields as shown below:

Provisioning_SCIM Connection

  • SCIM connector base URL : https://<ARTIFACTORY_URL>/access/api/v1/scim/v2
  • Unique identifier field for users : userName
  • Supported provisioning actions : Enable your preferred actions, in this example we enabled all of them, as we support in our platform all of these actions.
  • Authentication Mode : HTTP Header
  • Authorization : Paste the Access Admin Token you generated earlier.

Click Test Connector Configuration. A series of a successful action popups will appear:

Test Connector Configuration

Click Save , and go to the To App tab on the left menu, check all the checkboxes except “Sync Password”, since we are using SAML as our sign on method:

role assignment via scim

Click Save .

Hooray ! You’ve configured SCIM with your JFrog Artifactory. Now all you have left is to use it.

Step 3: Start using SCIM with JFrog Artifactory

Create a user. Go to Directory > People > Add Person . Fill the fields and Save .

Directory_Add Person

Now click the user you’ve just created, click Assign Applications, click Assign on your JFrog platform application.

Click Save and Done .

Assign Applications

Now your new user will appear in your JFrog Platform in the Users page:

JFrog Platform Users page

Let’s assume we want to disable the user, click More Actions > Deactivate .

Disable user

Your change will be automatically provisioned to your JFrog Platform application:

JFrog Platform

Whenever you make changes to your users on Okta, these changes will be reflected in your JFrog Platform, such as deactivate users, assign users to groups, etc. In the same way you can create groups, and push them easily into your JFrog DevOps platform .

SCIM makes your life a lot easier and intuitive when it comes to managing your users and groups, which is JFrog’s main motivation for implementing SCIM ing the JFrog Platform. You’ll enjoy quick and automated actions, as described above, that will help avoid security and compliance issues; you can add admin privileges to a group, and assign a bunch of users to that group, simply performed in one place. As the number of users in your organization grows and everyone starts using multiple applications, these actions will become more and more common.

Start working with SCIM in the JFrog Platform >

Sign up for blog updates

I have read and agreed to the Privacy Policy

Popular Tags

  • Artifactory
  • Best Practices

Try the JFrog Platform

In the cloud or self-hosted.

or Book a Demo

Your action was successful

Oops... Something went wrong

Please try again later

close

Information

frog hand

Modal Message

US Flag

Made for people. Built for productivity.

Slack is free to try for as long as you’d like

Airbnb

Move faster with your tools in one place

Automate away routine tasks with the power of generative AI and simplify your workflow with all your favorite apps ready to go in Slack.

Choose how you want to work

In Slack, you’ve got all the flexibility to work when, where and how it’s best for you. You can easily chat, send audio and video clips, or hop on a huddle to talk things out live.

Bring your team together

At the heart of Slack are channels: organized spaces for everyone and everything you need for work. In channels, it’s easier to connect across departments, offices, time zones and even other companies.

Teams large and small rely on Slack

Slack securely scales up to support collaboration at the world’s biggest companies.

of users say Slack has improved communication * Weighted average. Based on 2,707 survey responses from weekly Slack users in the U.S., UK, Australia and Canada with a ± 2% margin of error at 95% CI (December 2021).

feel their ability to work remotely has improved * Weighted average. Based on 2,707 survey responses from weekly Slack users in the U.S., UK, Australia and Canada with a ± 2% margin of error at 95% CI (December 2021).

feel more connected to their teams * Weighted average. Based on 2,707 survey responses from weekly Slack users in the U.S., UK, Australia and Canada with a ± 2% margin of error at 95% CI (December 2021).

role assignment via scim

“Whether you’re a small or large organization, executing anything from a discrete modernization program to a digital transformation initiative, Slack is an incredibly powerful tool in the hybrid world.”

* Weighted average. Based on 2,707 survey responses from weekly Slack users in the U.S., UK, Australia and Canada with a ± 2% margin of error at 95% CI (December 2021).

Take a deeper dive into a new way to work

role assignment via scim

Ready for the future of AI in Slack?

role assignment via scim

10 features to know (and love) on Slack’s 10th birthday

role assignment via scim

How OpenAI expands ChatGPT with Slack.

role assignment via scim

Top Slack tips to boost productivity

See all you can accomplish with slack.

role assignment via scim

  • Product Updates
  • Status Page
  • Automation Institute

# Configure SCIM in Azure Active Directory (AD)

Workato supports the System for Cross-domain Identity Management (SCIM 2.0) protocol with the Azure Active Directory (AD) identity provider.

NEW NAME FOR AZURE AD

(opens new window) . You may see either name in the Azure Portal during the transition period.

Configuring SCIM for Azure AD involves the following steps:

  • Prerequisites
  • Step 1: Configure custom extension attributes
  • Step 2: Configure automatic provisioning on Azure AD
  • Step 3: Configure attribute mappings between Azure AD and Workato
  • Step 4: Provision users

# Prerequisites

In Workato:

  • You must be a workspace admin.
  • Your organization must have the Data Monitoring/Advanced Security & Compliance add-on.
  • You must have SAML SSO successfully set up with your identity provider.
  • You must have already configured SCIM in Workato .

In Microsoft Azure:

  • You must have access to Azure AD with sufficient permissions.

# Step 1: Configure custom extension attributes

Before you can provision a user account from Azure AD to Workato, you must extend the Azure AD user schema to include a custom attribute specifying the user's Workato role.

(opens new window) , complete the following steps.

(opens new window) .

Run a Microsoft Graph query to list your Azure tenant's applications:

Select GET from the HTTP verb drop-down menu.

  • Enter https://graph.microsoft.com/v1.0/applications in the query box.

Select Run query .

Example request to list applications using Microsoft Graph Explorer

Find your application's id field in the output.

Find the id field

The id field is distinct from the appId field. Do not use appId .

Create an extension attribute called workato_role . In a later step, you will use this attribute to assign each user's role in your workspace. Note that in workspaces with the Environments feature enabled, workato_role is used to assign a role for the default DEV environment.

Select POST from the HTTP verb drop-down menu.

Enter the following URL in the query box and replace {id} with your application's ID:

Paste the following JSON in the Request body field:

Example request to create an extension attribute in Microsoft Graph Explorer

Locate the name field in the output and copy its value. It will look something like this:

Find the name field in the output

If your organization has the Environments feature in Workato: Repeat the preceding two steps using the example request bodies below. Send one request to create an extension attribute for the PROD environment, and another request for the TEST environment:

Ensure that you copy the value of the name field in each response.

Find the ID of the user you want to provision to Workato:

  • Enter https://graph.microsoft.com/v1.0/users in the query box.
  • Look for the user in the output and copy the value of their id attribute.

Assign the extension attribute(s) and the desired role to the user:

Select PATCH from the HTTP verb drop-down menu.

Enter the following URL in the query box and replace {id} with the user's ID:

Create a request body based on the following JSON, substituting the appropriate values, and paste it in the Request body field:

The following example assigns the user an Admin role in a workspace without the Environments feature enabled:

The following example assigns the user a different system role for each environment:

If the request is successful, the response is simply {} .

Successful role assignment

Confirm that the extension has been assigned to the user:

Enter the following URL into the search box, replacing {id} with the user's ID and {extension attribute name} with the extension name you want to confirm:

For example:

Check the response to confirm that the user has an extension attribute with the desired role. You should see output like this:

# Step 2: Configure automatic provisioning on Azure AD

After you extend the Azure AD user schema, you must configure automatic provisioning on Azure AD.

Navigate to the Workato SAML application you created in Azure AD.

CONFIGURE SAML SSO

If you have not yet configured SAML SSO for your Workato application, set up a non-gallery SAML application in Azure AD to access your Workato workspace.

Navigate to Manage > Provisioning .

Select Automatic from the Provisioning Mode drop-down menu.

In the Admin Credentials section, enter the Tenant URL and Secret Token fields using the base URL and SCIM token you generated when you configured SCIM in Workato .

Configure automatic provisioning

Select Test Connection . If the test is successful, Azure will display the message "The supplied credentials are authorized to enable provisioning":

Successful test connection

Select Save .

# Step 3: Configure attribute mappings between Azure AD and Workato

The next step is to update the Azure AD attribute mapping with the extension attributes you created previously.

Navigate to your Workato SAML application in Azure AD.

Expand the Mappings section and select Provision Azure Active Directory Users .

Provision Azure Active Directory Users setting

Ensure Enabled is set to Yes .

In the Target Object Actions section, check the boxes for Create and Update .

At the bottom of the page, select the Show advanced options checkbox.

Select Edit attribute list for customappsso .

At the bottom of the customappsso User Attributes list, add the following attribute name in the Name field and set Type to String :

If your organization has the Environments feature in Workato: Repeat the previous step to add the extension attributes for the TEST and PROD environments, using each of the following attribute names with Type set to String :

Extension attributes for an organization with the Environments feature enabled

Select Save and then Yes to confirm that you want to make the changes. You are returned to the Attribute Mapping page.

Select Add New Mapping .

In the Mapping type field, select Direct .

In the Source attribute field, select the workato_role extension attribute you configured previously, as shown in the following example:

In the Target attribute field, select the corresponding attribute you configured, as shown in the following example:

Select Always from the Apply this mapping drop-down menu if it is not already selected.

Edit attribute mapping for workato_role

Select OK .

If your organization has the Environments feature in Workato: Select Add New Mapping and repeat the previous steps to map the extension attributes for the TEST and PROD environments:

Example source attribute:

Example target attribute:

The Attribute Mapping page should then look like the following image:

Mapped extension attributes for a workspace with the Environments feature enabled

Select Save and then Yes to confirm you want to save your changes.

# Step 4: Provision users

After you configure automatic provisioning, you can assign Azure AD users and groups to your Workato application and then provision them.

Navigate to your Workato SAML application's overview in Azure AD.

Select Users and groups .

Select Add user/group .

Select None selected and search for the user or group you want to provision to Workato.

Select the user or group and click Select .

Select Assign .

In the sidebar, select Provisioning .

Choose whether to provision users automatically or on demand:

To run a cycle that automatically provisions users once every 40 minutes, select Start provisioning .

Between cycles, you can trigger a provisioning request immediately by selecting Stop provisioning and then Start provisioning .

To provision users on demand:

Select Provision on demand .

Search for the user you want to provision and select their name.

Select Provision .

If provisioning is successful, you'll see the following confirmation:

Successful user provisioning

Workato sends an email invitation to the selected users. Ask the user to verify their email address by clicking on the link in the email:

Email invitation to join a workspace

The collaborator can then sign in to the assigned workspace with the role(s) you configured.

TROUBLESHOOTING

If clicking on the invitation email redirects you to the Workato login page instead of your organization’s workspace, it is likely that you already have a Workato account associated with the same email. If you have forgotten your login credentials, reset your password.

You may optionally verify that the user has been added from the Workato activity audit log :

Activity audit log showing that a user has accepted an invitation

# Update users

To update a user's Workato role(s) from Azure AD, you must update their custom attributes.

Run a Microsoft Graph query to update the desired user's custom attributes:

Paste the following JSON in the Request body field, substituting the appropriate values:

For example, the following request body updates a user's role to NoAccess in the PROD environment of a workspace with the Environments feature enabled:

Updating a user's attributes using Microsoft Graph Explorer

Run a provisioning cycle on demand in Azure AD or wait for the next scheduled cycle.

# Deprovision users

There are two ways to deprovision a user:

  • App assignment removal
  • User deletion (soft)

Either way, the deprovisioned user is no longer able to access the Workato workspace. However, their recipes and connections remain available to the rest of the team.

DEPROVISIONING DURING AN ACTIVE SESSION

If users are deprovisioned during an active session, their next action locks them out from the workspace. Their data, such as recipes and connections, remain accessible to other users in the workspace.

# App assignment removal

In Azure AD, navigate to Users .

Select the user you want to deactivate.

Select the Workato SAML application from the Applications section.

Select Remove .

Removing the app assignment for a user

# User deletion (soft)

Soft deletions allow you to recover user accounts if needed.

Select Delete .

Select Delete again.

AWS Business Intelligence Blog

Manage users and group memberships on amazon quicksight using scim events generated in iam identity center with azure ad.

Amazon QuickSight is cloud-native, scalable business intelligence (BI) service that supports identity federation. AWS Identity and Access Management (IAM) allows organizations to use the identities managed in their enterprise identity provider (IdP) and federate single sign-on (SSO) to QuickSight. As more organizations are building centralized user identity stores with all their applications, including on-premises apps, third-party apps, and applications on AWS, they need a solution to automate user provisioning into these applications and keep their attributes in sync with their centralized user identity store.

When architecting a user repository, some organizations decide to organize their users in groups or use attributes (such as department name), or a combination of both. If your organization uses Microsoft Azure Active Directory (Azure AD) for centralized authentication and utilizes its user attributes to organize the users, you can enable federation across all QuickSight accounts as well as manage users and their group membership in QuickSight using events generated in the AWS platform. This allows system administrators to centrally manage user permissions from Azure AD. Provisioning, updating, and de-provisioning users and groups in QuickSight no longer requires management in two places with this solution. This makes sure that users and groups in QuickSight stay consistent with information in Azure AD through automatic synchronization.

In this post, we walk you through the steps required to configure federated SSO between QuickSight and Azure AD via AWS IAM Identity Center (Successor to AWS Single Sign-On) where automatic provisioning is enabled for Azure AD. We also demonstrate automatic user and group membership update using a System for Cross-domain Identity Management (SCIM) event.

Solution overview

The following diagram illustrates the solution architecture and user flow.

solution architecture and user flow.

In this post, IAM Identity Center provides a central place to bring together administration of users and their access to AWS accounts and cloud applications. Azure AD is the user repository and configured as the external IdP in IAM Identity Center. In this solution, we demonstrate the use of two user attributes ( department , jobTitle ) specifically in Azure AD. IAM Identity Center supports automatic provisioning (synchronization) of user and group information from Azure AD into IAM Identity Center using the SCIM v2.0 protocol. With this protocol, the attributes from Azure AD are passed along to IAM Identity Center, which inherits the defined attribute for the user’s profile in IAM Identity Center. IAM Identity Center also supports identity federation with SAML (Security Assertion Markup Language) 2.0. This allows IAM Identity Center to authenticate identities using Azure AD. Users can then SSO into applications that support SAML, including QuickSight. The first half of this post focuses on how to configure this end to end (see Sign-In Flow in the diagram).

Next, user information starts to get synchronized between Azure AD and IAM Identity Center via SCIM protocol. You can automate creating a user in QuickSight using an AWS Lambda function triggered by the CreateUser SCIM event originated from IAM Identity Center, which was captured in Amazon EventBridge . In the same Lambda function, you can subsequently update the user’s membership by adding into the specified group (whose name is comprised of two user attributes: department-jobTitle ), otherwise create the group if it doesn’t exist yet, prior to adding the membership.

In this post, this automation part is omitted because it would be redundant with the content discussed in the following sections.

This post explores and demonstrates an UpdateUser SCIM event triggered by the user profile update on Azure AD. The event is captured in EventBridge, which invokes a Lambda function to update the group membership in QuickSight (see Update Flow in the diagram). Because a given user is supposed to belong to only one group at a time in this example, the function will replace the user’s current group membership with the new one.

In Part I, you set up SSO to QuickSight from Azure AD via IAM Identity Center (the sign-in flow):

  • Configure Azure AD as the external IdP in IAM Identity Center.
  • Add and configure an IAM Identity Center application in Azure AD.
  • Complete configuration of IAM Identity Center.
  • Set up SCIM automatic provisioning on both Azure AD and IAM Identity Center, and confirm in IAM Identity Center.
  • Add and configure a QuickSight application in IAM Identity Center.
  • Configure a SAML IdP and SAML 2.0 federation IAM role.
  • Configure attributes in the QuickSight application.
  • Create a user, group, and group membership manually via the AWS Command Line Interface (AWS CLI) or API.
  • Verify the configuration by logging in to QuickSight from the IAM Identity Center portal.

In Part II, you set up automation to change group membership upon an SCIM event (the update flow):

  • Understand SCIM events and event patterns for EventBridge.
  • Create attribute mapping for the group name.
  • Create a Lambda function.
  • Add an EventBridge rule to trigger the event.
  • Verify the configuration by changing the user attribute value at Azure AD.

Prerequisites

For this walkthrough, you should have the following prerequisites:

  • IAM Identity Center. For instructions, refer to Steps 1–2 in the AWS IAM Identity Center Getting Started guide .
  • A QuickSight account subscription.
  • Basic understanding of IAM and privileges required to create an IAM IdP, roles, and policies.
  • userPrincipalName – Mandatory field for Azure AD user.
  • displayName – Mandatory field for Azure AD user.
  • Mail – Mandatory field for IAM Identity Center to work with QuickSight.
  • jobTitle – Used to allocate user to group
  • department – Used to allocate user to group.
  • givenName – Optional field.
  • surname – Optional field.

Part I: Set up SSO to QuickSight from Azure AD via IAM Identity Center

This section presents the steps to set up the sign-in flow.

Configure an external IdP as Azure AD in IAM Identity Center

To configure your external IdP, complete the following steps:

  • On the IAM Identity Center console, choose Settings .
  • Choose Actions on the Identity source tab, then choose Change identity source .
  • Choose External identity provider , then choose Next .

The IdP metadata is displayed. Keep this browser tab open.

Add and configure an IAM Identity Center application in Azure AD

To set up your IAM Identity Center application, complete the following steps:

  • Open a new browser tab.
  • Log in to the Azure AD portal using your Azure administrator credentials.
  • Under Azure services , choose Azure Active Directory .
  • In the navigation pane, under Manage , choose Enterprise applications , then choose New application .

role assignment via scim

  • Enter a name for the application (in this post, we use IIC-QuickSight ) and choose Create .
  • In the Manage section, choose Single sign-on , then choose SAML .
  • In the Assign users and groups section, choose Assign users and groups .
  • Choose Add user/group and add at least one user.
  • Select User as its role.
  • In the Set up single sign on section, choose Get started .
  • Identifier – The value in the IAM Identity Center issuer URL field.
  • Reply URL – The value in the IAM Identity Center Assertion Consumer Service (ACS) URL field.
  • Sign on URL – Leave blank.
  • Relay State – Leave blank.
  • Logout URL – Leave blank.
  • Choose Save .

The configuration should look like the following screenshot.

configuration

You’re all set with Azure AD SSO configuration at this moment. Later on, you’ll return to this page to configure automated provisioning, so keep this browser tab open.

Complete configuration of IAM Identity Center

Complete your IAM Identity Center configuration with the following steps:

  • Go back to the browser tab for IAM Identity Center console which you have kept open in previous step.
  • For IdP SAML metadata under the Identity provider metadata section, choose Choose file .
  • Choose the previously downloaded metadata file ( IIC-QuickSight.xml ).
  • For IdP certificate under the Identity provider metadata section, choose Choose file .
  • Choose the previously downloaded certificate file ( IIC-QuickSight.cer ).
  • Choose Next .
  • Enter ACCEPT, then choose Change Identity provider source .

Set up SCIM automatic provisioning on both Azure AD and IAM Identity Center

Your provisioning method is still set as Manual (non-SCIM). In this step, we enable automatic provisioning so that IAM Identity Center becomes aware of the users, which allows identity federation to QuickSight.

choose Enable

  • Go back to the browser tab (Azure AD), which you kept open in Step 1.
  • In the Manage section, choose Enterprise applications .
  • Choose IIC-QuickSight , then choose Provisioning .
  • Tenant URL – The value in the SCIM endpoint field.
  • Secret Token – The value in the Access token field.
  • Choose Test Connection .

set Provisioning Status to On

  • Choose Start provisioning to start automatic provisioning using the SCIM protocol.

When provisioning is complete, it will result in propagating one or more users from Azure AD to IAM Identity Center. The following screenshot shows the users that were provisioned in IAM Identity Center.

the users that were provisioned in IAM Identity Center

Note that upon this SCIM provisioning, the users in QuickSight should be created using the Lambda function triggered by the event originated from IAM Identity Center. In this post, we create a user and group membership via the AWS CLI (Step 8).

Add and configure a QuickSight application in IAM Identity Center

In this step, we create a QuickSight application in IAM Identity Center. You also configure an IAM SAML provider, role, and policy for the application to work. Complete the following steps:

  • On the IAM Identity Center console, on the Applications page, choose Add Application .
  • For Pre-integrated application under Select an application , enter quicksight .
  • Select Amazon QuickSight , then choose Next .
  • Enter a name for Display name , such as Amazon QuickSight .
  • Choose Download under IAM Identity Center SAML metadata file and save it in your computer.
  • Leave all other fields as they are, and save the configuration.
  • Open the application you’ve just created, then choose Assign Users .

The users provisioned via SCIM earlier will be listed.

  • Choose all of the users to assign to the application.

Configure a SAML IdP and a SAML 2.0 federation IAM role

To set up your IAM SAML IdP for IAM Identity Center and IAM role, complete the following steps:

  • On the IAM console, in the navigation pane, choose Identity providers , then choose Add provider .
  • Choose SAML as Provider type , and enter Azure-IIC-QS as Provider name .
  • Under Metadata document , choose Choose file and upload the metadata file you downloaded earlier.
  • Choose Add provider to save the configuration.
  • In the navigation pane, choose Roles , then choose Create role .
  • For Trusted entity type , select SAML 2.0 federation .
  • For Choose a SAML 2.0 provider , select the SAML provider that you created, then choose Allow programmatic and AWS Management Console access .
  • On the Add Permission page, choose Next .

In this post, we create QuickSight users via an AWS CLI command, therefore we’re not creating any permission policy. However, if the self-provisioning feature in QuickSight is required, the permission policy for the CreateReader , CreateUser , and CreateAdmin actions (depending on the role of the QuickSight users) is required.

  • On the Name, review, and create page, under Role details , enter qs-reader-azure for the role.
  • Choose Create role .
  • Note the ARN of the role.

You use the ARN to configure attributes in your IAM Identity Center application.

Configure attributes in the QuickSight application

To associate the IAM SAML IdP and IAM role to the QuickSight application in IAM Identity Center, complete the following steps:

  • On the IAM Identity Center console, in the navigation pane, choose Applications .
  • Select the Amazon QuickSight application, and on the Actions menu, choose Edit attribute mappings .
  • Choose Add new attribute mapping .
  • Configure the mappings in the following table.

Note the following values:

  • Replace <ACCOUNTID> with your AWS account ID.
  • PrincipalTag:Email is for the email syncing feature for self-provisioning users that need to be enabled on the QuickSight admin page. In this post, don’t enable this feature because we register the user with an AWS CLI command.
  • Choose Save changes .

Create a user, group, and group membership with the AWS CLI

As described earlier, users and groups in QuickSight are being created manually in this solution. We create them via the following AWS CLI commands.

The first step is to create a user in QuickSight specifying the IAM role created earlier and email address registered in Azure AD. The second step is to create a group with the group name as combined attribute values from Azure AD for the user created in the first step. The third step is to add the user into the group created earlier; member-name indicates the user name created in QuickSight that is comprised of <IAM Role name>/<session name> . See the following code:

At this point, the end-to-end configuration of Azure AD, IAM Identity Center, IAM, and QuickSight is complete.

Verify the configuration by logging in to QuickSight from the IAM Identity Center portal

Now you’re ready to log in to QuickSight using the IdP-initiated SSO flow:

  • Open a new private window in your browser.
  • Log in to the IAM Identity Center portal ( https://d-xxxxxxxxxx.awsapps.com/start ).

You’re redirected to the Azure AD login prompt.

  • Enter your Azure AD credentials.

You’re redirected back to the IAM Identity Center portal.

  • In the IAM Identity Center portal, choose Amazon QuickSight .

IAM Identity Center portal, choose Amazon QuickSight

Part II: Automate group membership change upon SCIM events

In this section, we configure the update flow.

Understand the SCIM event and event pattern for EventBridge

When an Azure AD administrator makes any changes to the attributes on the particular user profile, the change will be synced with the user profile in IAM Identity Center via SCIM protocol, and the activity is recorded in an AWS CloudTrail event called UpdateUser by sso-directory.amazonaws.com (IAM Identity Center) as the event source. Similarly, the CreateUser event is recorded when a user is created on Azure AD, and the DisableUser event is for when a user is disabled.

The following screenshot on the   Event history page shows two CreateUser events: one is recorded by IAM Identity Center, and the other one is by QuickSight. In this post, we use the one from IAM Identity Center.

CloudTrail console

In order for EventBridge to be able to handle the flow properly, each event must specify the fields of an event that you want the event pattern to match. The following event pattern is an example of the UpdateUser event generated in IAM Identity Center upon SCIM synchronization:

In this post, we demonstrate an automatic update of group membership in QuickSight that is triggered by the UpdateUser SCIM event.

Create attribute mapping for the group name

In order for the Lambda function to manage group membership in QuickSight, it must obtain the two user attributes ( department and jobTitle ). To make the process simpler, we’re combining two attributes in Azure AD ( department , jobTitle ) into one attribute in IAM Identity Center ( title ), using the attribute mappings feature in Azure AD. IAM Identity Center then uses the title attribute as a designated group name for this user.

  • Log in to the Azure AD console, navigate to Enterprise Applications , IIC-QuickSight , and Provisioning .
  • Choose Edit attribute mappings .

Azure AD console, Under mappings

  • Choose jobTitle from the list of Azure Active Directory Attributes .
  • Mapping Type – Expression
  • Expression – Join("-", [department], [jobTitle])

update settings

  • You can leave the provisioning page.

The attribute is automatically updated in IAM Identity Center. The updated user profile looks like the following screenshots (Azure AD on the left, IAM Identity Center on the right).

updated user profile

Create a Lambda function

Now we create a Lambda function to update QuickSight group membership upon the SCIM event. The core part of the function is to obtain the user’s title attribute value in IAM Identity Center based on the triggered event information, and then to ensure that the user exists in QuickSight. If the group name doesn’t exist yet, it creates the group in QuickSight and then adds the user into the group. Complete the following steps:

  • On the Lambda console, choose Create function .
  • For Name , enter UpdateQuickSightUserUponSCIMEvent .
  • For Runtime , choose Python 3.9 .
  • For Time Out , set to 15 seconds.
  • For Permissions , create and attach an IAM role that includes the following permissions (the trusted entity (principal) should be lambda.amazonaws.com ): { "Version": "2012-10-17", "Statement": [ { "Sid": "MinimalPrivForScimQsBlog", "Effect": "Allow", "Action": [ "identitystore:DescribeUser", "quicksight:RegisterUser", "quicksight:DescribeUser", "quicksight:CreateGroup", "quicksight:DeleteGroup", "quicksight:DescribeGroup", "quicksight:ListUserGroups", "quicksight:CreateGroupMembership", "quicksight:DeleteGroupMembership", "quicksight:DescribeGroupMembership", "logs:CreateLogGroup", "logs:CreateLogStream", "logs:PutLogEvents" ], "Resource": "*" } ] }
  • Write Python code using the Boto3 SDK for IdentityStore and QuickSight . The following is the entire sample Python code:

Note that this Lambda function requires Boto3 1.24.64 or later. If the Boto3 included in the Lambda runtime is older than this, use a Lambda layer to use the latest version of Boto3. For more details, refer to How do I resolve “unknown service”, “parameter validation failed”, and “object has no attribute” errors from a Python (Boto 3) Lambda function .

Add an EventBridge rule to trigger the event

To create an EventBridge rule to invoke the previously created Lambda function, complete the following steps:

  • On the EventBridge console, create a new rule.
  • For Name , enter updateQuickSightUponSCIMEvent .
  • For Event pattern , enter the following code: { "source": ["aws.sso-directory"], "detail-type": ["AWS API Call via CloudTrail"], "detail": { "eventSource": ["sso-directory.amazonaws.com"], "eventName": ["UpdateUser"] } }
  • For Targets , choose the Lambda function you created ( UpdateQuickSightUserUponSCIMEvent ).
  • Enable the rule.

Verify the configuration by changing a user attribute value at Azure AD

Let’s modify a user’s attribute at Azure AD, and then check if the new group is created and that the user is added into the new one.

  • Go back to the Azure AD console.
  • From Manage , click Users .
  • Choose one of the users you previously used to log in to QuickSight from the IAM Identity Center portal.

Edit Properties

  • Save the configuration.
  • From Manage , choose Enterprise application , your application name, and Provisioning .
  • Choose Stop provisioning and then Start provisioning in sequence.

In Azure AD, the SCIM provisioning interval is fixed to 40 minutes . To get immediate results, we manually stop and start the provisioning.

Provisioning status

  • Navigate to the QuickSight console.
  • On the drop-down user name menu, choose Manage QuickSight .
  • Choose Manage groups .

Now you should find that the new group is created and the user is assigned to this group.

new group is created and the user is assigned to this group

When you’re finished with the solution, clean up your environment to minimize cost impact. You may want to delete the following resources:

  • Lambda function
  • Lambda layer
  • IAM role for the Lambda function
  • CloudWatch log group for the Lambda function
  • EventBridge rule
  • Note : There can only be one QuickSight account per AWS account. So your QuickSight account might already be used by other users in your organization. Delete the QuickSight account only if you explicitly set it up to follow this blog and are absolutely sure that it is not being used by any other users.
  • IAM Identity Center instance
  • IAM ID Provider configuration for Azure AD
  • Azure AD instance

This post provided step-by-step instructions to configure IAM Identity Center SCIM provisioning and SAML 2.0 federation from Azure AD for centralized management of QuickSight users. We also demonstrated automated group membership updates in QuickSight based on user attributes in Azure AD, by using SCIM events generated in IAM Identity Center and setting up automation with EventBridge and Lambda.

With this event-driven approach to provision users and groups in QuickSight, system administrators can have full flexibility in where the various different ways of user management could be expected depending on the organization. It also ensures the consistency of users and groups between QuickSight and Azure AD whenever a user accesses QuickSight.

Join the Quicksight Community to ask, answer and learn with others and explore additional resources.

About the authors

role assignment via scim

  • QuickSight Community
  • QuickSight Documentation
  • QuickSight Customer Stories
  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Twitch
  •  Email Updates
  • Managing Password Sync Groups
  • Configuring Advanced Password Management Options
  • Configuring User Authentication for Password Resets

Role Provisioning Retries

  • Synchronizing Attributes
  • Monitoring Provisioning
  • Secure Data Sharing
  • Viewing Cloud Access
  • Access Recommendations

Automating Role Assignment

Users often need to be given access based on attributes like their job title, department, or location. You can configure assignment criteria to automatically grant a role to users who should have it. This also provisions the entitlements in the role’s access profiles to each user’s source accounts.

Additionally, when a user no longer meets the criteria, IdentityNow deprovisions the role and its associated access profiles. This can occur because the assignment criteria or the identity data changed.

Revoking roles and entitlements does not remove source accounts, even if the accounts were created by role provisioning or if all entitlements are removed from the account.

Roles can be automatically assigned to identities that:

  • Meet the criteria you configure for role membership.

Are added to the role's list of identities.

You can also mark a role as requestable . If a user requests that role and their request is approved, they will gain access to the role and its access profiles.

Configuring Role Assignment

Go to  Admin > Access Model > Roles .

In the cards view, select Edit on the role you want to configure.

Select Define Assignment .

Under Choose Setup Type , select Rule Builder or Identity List .

  • Use Standard Criteria to configure the logic through data-driven criteria.
  • Use Identity List to manually select which identities should have the role.

Select Save .

In the role header, select Enable Role .

Your new or updated role configurations will be applied to your identities the next time they are analyzed in identity processing . To manually initiate this update for all identities, select Apply Changes at the top of the role list page.

Best Practices

  • For best system performance, when creating or updating multiple roles, wait to select Apply Changes until you have finished the whole set of changes.
  • If an identity has multiple accounts on a source, you can configure access profiles to determine which account receives the entitlements when the role is assigned to the identity.

Standard Criteria

Use the Standard Criteria builder to configure the criteria for selecting the identities that should have this role automatically assigned and provisioned.

Select Add Group to begin defining your criteria.

In each row, use the Type dropdown to choose the type of attribute to use in the provisioning criteria.

  • Identity attribute - Use any mapped attribute from an identity profile.
  • Account attribute - Use an attribute from the account schema for the selected source. The description attribute, as well as the attributes marked as the account ID and account name , can't be used for role criteria.
  • Entitlement - Use a specific entitlement from the selected source

For account attribute and entitlement types, use the Source dropdown list to select which source the attribute or entitlement should come from.

For account and identity attributes, type the name of the attribute in the Attribute field.

Only string and boolean type account and identity attributes are supported.

Use the Operation dropdown list to choose how to compare the value of the selected attribute with the value you enter.

  • Equals - The attribute and value must match.
  • Does Not Equal – The attribute and value cannot match.
  • Contains - The specified value must exist somewhere within the attribute’s value.

For identity and account attributes, use the Value field to enter the text you'd like to compare to the attribute. This field is case insensitive.

For entitlements, select the entitlement's name in the dropdown list.

To filter on the identity attribute Lifecycle State, you must enter the technical name of the lifecycle state in the Value field.

If you need multiple criteria, select Add Criteria to add another row.

  • AND means all criteria must be met while OR means meeting any of the criteria produces a match.

If your requirements are more complex, needing both AND and OR relationships, use Add Group to add another group.

Refer to Standard Role Criteria Examples for more information.

Identity List

When you choose Identity List as the setup type, you choose the identities by name that should receive the role.

Search for and select an identity in Add Identities and select the + icon to add it.

Repeat to add more identities.

Select the X icon on any row to remove the identity from the role.

Standard Role Criteria Examples

Your role assignment rules may involve multiple criteria. Use these examples as models for how to build your role assignment rules, especially when your assignment criteria are complex and require both AND and OR relationships in their expression.

Operators Within and Between Groups

When you add multiple criteria to a group, they must be connected by an AND operator or an OR operator.

  • AND relationships mean all criteria must be met for the identity to qualify for the role
  • OR relationships mean matching any of the criteria qualifies the identity for the role

You specify this with the Within Groups operator selection.

When you need to specify more complex requirements, you can add multiple groups so you can use AND relationships within each group and OR between them, or vice versa.

If you choose AND for your Within Groups operator, the operator applied between groups is automatically OR .

role assignment via scim

If you choose OR for your Within Groups operator, the between groups operator is automatically AND .

role assignment via scim

OR Within Groups

This example shows two groups of criteria. They use an OR relationship within each group and an AND relationship between them. This means the role will be granted to users who match at least one criterion from both groups.

Role Criteria: Grant this role to users who meet both of these requirements:

  • Users who have either the manager Sam Johnson or the entitlement on the Standard Accounts called "Entitlement Five"
  • Users in an active lifecycle state

role assignment via scim

AND Within Groups

This example shows two groups of criteria with an AND relationship within each group and an OR relationship between groups. This means the role will be granted to users who match all criteria within either group.

Role criteria: Grant this role to identities that meet either of these requirements:

  • Identities that have both the Entitlement Seven and Entitlement Five entitlements from the Standard Accounts source.
  • Identities with the Engineer value in the department attribute on the Standard Accounts source.

role assignment via scim

In this example, users with only one of the specified entitlements won't receive the role unless they are also in the Engineer department on the Standard Accounts source.

Automated role provisioning requests which fail with a retryable error are automatically retried once per hour, up to 3 times.

Explaining the Provisioning of Users and Roles in SAP Build Work Zone

After completing this lesson, you will be able to:

  • Distinguish between the role of SAP Cloud Identity Services and Identity Provisioning (IPS)
  • List the available mechanisms to synchronize users and their authorization assignments into SAP Build Work Zone

SAP BTP Subaccount Users and Authorizations

To successfully log in to SAP Build Work Zone, users and assigned authorizations must be available across several components of the overall solution architecture. This includes the usual SAP BTP subaccount level user and role (collection) assignment. Furthermore, SAP Build Work Zone, advanced edition and SAP SuccessFactors Work Zone require service-specific user persistence and role assignment, both on the service level (tenant) and in the Digital Workplace Service (DWS) layer.

To access SAP Build Work Zone, advanced edition or SAP SuccessFactors Work Zone, users must be assigned to one or more default role collections that are created upon subscribing to this service on the subaccount level. Additionally, an XSUAA shadow user (to which these role collections are assigned and mapped) on the SAP BTP subaccount → Security → Users .

Shadow Users can be created in three ways. Not all are specific to SAP Build Work Zone but are uniformly used and available when using any service on the SAP BTP multi-cloud (CF) environment:

  • Manually create users through the admin UI on the SAP BTP subaccount cockpit.
  • Create users via the XSUAA SCIM API, for example, using the SAP Cloud Identity Services, Identity Provisioning (IPS). For this setup, a dedicated target system type is available to create, update, and remove users.
  • Automatically create and update users based on the login via the connected IdP. For this to work, the create shadow users flag for the IdP trust must be enabled.

Role collections can also be assigned in multiple ways, not all specific to SAP Build Work Zone but uniformly used and available when using any service on the SAP BTP multi-cloud (CF) environment:

  • Manually assign through the admin UI on the SAP BTP subaccount cockpit.
  • Use attribute mapping (for example, Groups) from the connected IdP, either relying on the SAML2 assertion or OIDC token values.
  • Assign through the XSUAA SCIM API, for example, using the SAP Cloud Identity Services, Identity Provisioning (IPS). For this setup, a dedicated target system type is available to assign or unassign role collections to users.

SAP Build Work Zone Content Manager Role Assignment for Content Providers

As explained in previous units, specifically the unit on different integration scenarios, connecting to content providers is one key integration mechanism to make different business apps available to users in SAP Build Work Zone. In the context of this content provider configuration, the role assignment (referring to the roles in the source system mapped to roles in the SAP Build Work Zone content manager) is an important aspect. There are two options available for assigning those content provider roles inside SAP Build Work Zone:

  • Roles are automatically created as role collections on the SAP BTP subaccount following a specific syntax or prefix. As outlined in an earlier lesson, the assignment to those roles is then done.
  • Directly assign the roles inside SAP Build Work Zone, using a dedicated API. This presents one of two REST APIs based on the System for Cross-domain Identity Management (SCIM 2.0) specification.

For this second option, the SCIM API is used to create a base SCIM user record alongside the SCIM groups representing the required roles from the source system, for example, SAP S/4HANA. The default for using this API is the SAP Cloud Identity Services, Identity Provisioning (IPS) with a dedicated connector available for these role assignments. Alternatively, the API can be connected to from any other external client. It isn't limited to the usage of IPS. The figure, Content Manager Role Assignment Through SCIM API - For integrated Content Providers, outlines the different options the API provides for this purpose.

Note that the DWS URL relates to the overall SAP Build Work Zone URL as follows:

role assignment via scim

When you choose a user in the expression builder, we pull the user's attributes from Entra AD however the "approleassignment" attribute is not retrieved so the expressions using this attribute are evaluated to a NULL value.

I will work on getting our documentation updated to include this scenario.

This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.

Comments have been turned off. Learn more

IMAGES

  1. Microsoft Entra on-premises app provisioning to SCIM-enabled apps

    role assignment via scim

  2. Tutoriel : Développer un point de terminaison SCIM pour le

    role assignment via scim

  3. Automate User Provisioning and Group Synchronization through an

    role assignment via scim

  4. SCIM API 2.0

    role assignment via scim

  5. Tutorial

    role assignment via scim

  6. SCIM overview

    role assignment via scim

VIDEO

  1. Fishtank LIVE: Letty puts on the GOLDSTRIKER SUIT

  2. Activities and Roles in scrum fremwork || unit 3 lecture 4

COMMENTS

  1. Roles and Entitlements

    This quickstart shows how to setup the Roles and Entitlements functionality through the SCIM component. This includes enabling the /Roles & /Entitlements endpoints, as well as building up either a roles or entitlements structure to be added to an in-memory store. Throughout the SCIM component and in this documentation Roles and Entitlements may be refeerred to as Assignments, using models such ...

  2. Tutorial

    The Microsoft.SCIM project is the library that defines the components of the web service that conforms to the SCIM specification. It declares the interface Microsoft.SCIM.IProvider, requests are translated into calls to the provider's methods, which would be programmed to operate on an identity store.

  3. okta

    Okta is managing the user directory and the application is currently creating, updating and deactivating users when the users are altered in Okta. It does not seem obvious to me how I could use the SCIM standard to manage which part of the organization, and which role, each user should have. I imagined that I could perhaps use Groups for that ...

  4. How to Configure Rules for Automatic Role Assignment using SCIM

    How to Configure Rules for Automatic Role Assignment using SCIM : VIDIZMO Helpdesk. Integration and Customization Provisioning via SCIM. Print. Getting Started with VIDIZMO. VIDIZMO Account and Portal. Version7+, SaaS, Azure, AWS, On-Premise, DEMS, EnterpriseTube, Getting to Know Your VIDIZMO Account and Portal.

  5. Automatic role and user provisioning to Snowflake from Azure AD

    The only way to automate the assignment of a role via SCIM is to have the role exist as a group in Azure AD and then to add the user to the group in Azure AD. Groups in Azure AD are created as ...

  6. Provisioning users and groups with SCIM using the REST API

    GitHub Enterprise Cloud deletes all of the user's SCIM attributes, emails, SSH keys, personal access tokens, and GPG keys. The user's account on GitHub Enterprise Cloud is suspended, and authentication to sign in to the account will fail. To reprovision the user, you must use the POST method to create a new user.

  7. Manage and provision users with SCIM

    Step 4: Manage User Roles and Groups. You can assign organization roles, workspace memberships, workspace roles, and workspace groups through SCIM groups. To use SCIM groups for managing membership and roles, your identity provider must push/pull SCIM groups by their display names, following a specific convention described below. Entitlement.

  8. Provisioning with SCIM

    SCIM is becoming the de facto standard for provisioning and, when used in conjunction with federation standards like SAML or OpenID Connect, provides administrators an end-to-end standards-based solution for access management. SCIM is a standardized definition of two endpoints - a /Users endpoint and a /Groups endpoint.

  9. Manage Users and Groups with SCIM support

    The JFrog implementation of SCIM protocol provides the core of SCIM v2.0 specification. SCIM implementation relies on REST endpoints conforming with the SCIM schema, and allows you to create, delete, disable users and groups, associate between groups and users, and many other actions that can be performed through your Identity Provider (IdP).

  10. Manage members with SCIM provisioning

    SCIM provisioning allows Workspace Owners and Admins to manage members more efficiently. Here's what you can do: Create or deactivate a member. Create or deactivate a Multi-Channel Guest*. Sync and update members' profile fields. Create or delete a user group. Add or remove members from a user group. *Only available on the Enterprise Grid plan.

  11. Provisioning with SCIM

    Step 1: Define your schema. Every application requires different attributes to create a user or group. Start your integration by identifying the objects (users, groups) and attributes (name, manager, job title, etc.) that your application requires. The SCIM standard defines a schema for managing users and groups.

  12. SCIM Roles and Entitlements Extension

    The System for Cross-domain Identity Management (SCIM) protocol's schema RFC RFC7643 defines the complex core schema attributes "roles" and "entitlements". For both of these concepts, frequently only a predetermined set of values are accepted by a SCIM service provider. The values that are accepted may vary per customer or tenant based on customizable configuration in the service provider's ...

  13. Configure and use SCIM in Azure Active Directory

    You may see either name in the Azure Portal during the transition period. Configuring SCIM for Azure AD involves the following steps: Prerequisites. Step 1: Configure custom extension attributes. Step 2: Configure automatic provisioning on Azure AD. Step 3: Configure attribute mappings between Azure AD and Workato.

  14. Manage users and group memberships on Amazon QuickSight using SCIM

    The users provisioned via SCIM earlier will be listed. ... review, and create page, under Role details, enter qs-reader-azure for the role. Choose Create role. Note the ARN of the role. ... _group}.") # Create group membership based on IIC attribute "Title" logger.info(f"## Starting group membership assignment.") if in_desired_group is True ...

  15. Automating Role Assignment

    Go to Admin > Access Model > Roles. In the cards view, select Edit on the role you want to configure. Select Define Assignment. Under Choose Setup Type, select Rule Builder or Identity List. Use Standard Criteria to configure the logic through data-driven criteria. Use Identity List to manually select which identities should have the role.

  16. How to scope User SCIM provisioning based on App Roles

    I have essentially accomplished this by setting the License level groups with the appropriate role, and setting the M365 groups with a role of "Restricted User". However, this leads to excessive API calls through SCIM with numerous errors, for each appearance of an unlicensed user.

  17. Explaining the Provisioning of Users and Roles in SAP Build Work

    For this second option, the SCIM API is used to create a base SCIM user record alongside the SCIM groups representing the required roles from the source system, for example, SAP S/4HANA. The default for using this API is the SAP Cloud Identity Services, Identity Provisioning (IPS) with a dedicated connector available for these role assignments.

  18. Set seat types via SCIM

    Tip: Along with SCIM, we also recommend setting default seat types for all new members and guests in your organization.. Assigning a person's seat type via SCIM takes precedence over the default seat type setting. However, if you don't use SCIM to assign seats for particular users or groups, Figma will use the organization's default seat type instead.

  19. Azure AD SCIM 2.0 roles and appRoleAssignments empty

    This test user has been assigned with Directory Roles and Application Roles. An attribute (with default value "n/a") for the appRoleAssignments was added and mapped. And API permissions for read/write Application Role Assignments was added. Screenshot of SCIM Attribute mappings with target application

  20. Shopify Help Center

    Role assignment in SCIM. After you complete SCIM configuration, you can optionally assign roles to SCIM users through your identity service provider. Before you assign a role to a user, verify that the role exists in your organization. Existing SCIM users aren't updated if the role hasn't been created for your organization.

  21. Configuring the Azure AD Databricks SCIM application with Terraform

    I'm trying to solve this puzzle myself. On 1: From my understanding, you can assign users and groups via role assignments through MS Graph. See first tf example here App role assignment for accessing Microsoft Graph,. And apply the described configs from Automate SCIM provisioning using Microsoft Graph, such as granting these permissions:. Application.ReadWrite.All Application.ReadWrite.OwnedBy

  22. Error while assigning admin role to SCIM provisioned AAD groups in

    The account admins can assign them using ,the principal ID which can be retrieved using the SCIM API. /principal_id = databricks_group.this.id. permissions = ["ADMIN"] Make sure to enable identity federation , to assign group roles and have premium plan in order to manage the assignment of users to workspaces.

  23. AppRoleAssignmentsComplex does not give any results when tested in

    Hi, I would like provision application roles via SCIM. Application Roles are assigned to groups that are assigned to the application. ... We have a known behavior where when using the app role assignment attribute on the expression builder, instead of choosing a user to test, you must use the "Set default values" option as shown below: ...