Creating Your Own SCIM 2 application
Authentication requirements for SCIM 2.0 requests
Defining permissions for SCIM 2.0 requests
Configuring an LDAP Mapping SCIM 2.0 resource type
Configuring a correlated LDAP data view
Configuring permissions for SCIM 2.0 operations