Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Custom SCIM bridge deployments fail if using a scimsession file generated from a marketplace deployment #324

Open
ag-adampike opened this issue Jul 26, 2024 · 0 comments

Comments

@ag-adampike
Copy link
Member

ag-adampike commented Jul 26, 2024

Each scimsession credentials file generated by an app deployed using our "one-click" marketplace apps for SCIM bridge includes a value for the domain key, which corresponds to the public domain of the SCIM bridge supplied during setup. For example:

"domain":"op-scim.example.com"

This value of this key is empty when generating credentials for a custom deployment, and is expected to be empty when deploying SCIM bridge on any other platform:

"domain":""

If using a scimsession file generated by using our marketplace app deployments in a custom deployment, the deployment may fail.

In particular, this is to be expected if migrating a SCIM bridge to Google Cloud Run using credentials that were generated by a Google Cloud marketplace app deployment.

Known workarounds:

Important

The SCIM bridge URL for a marketplace app deployment always uses the domain name of a customer-created DNS record that points to the IP of its public endpoint. The URL must be updated in the identity provider if the new deployment has a different domain name, or the domain name of the existing DNS record must be updated or recreated if supplying a custom domain name for the new deployment.

Modify the existing scimsession file:

  1. Replace the value for the domain key in a text editor with an empty string (see above example).
  2. Redeploy using the modified scimsession file.

Regenerate credentials using 1Password.com:

  1. Access the provisioning settings page in your 1Password account.
  2. Click "Regenerate credentials" and follow the instructions.
  3. Redeploy using the new scimsession file.
  4. Update the bearer token in your identity provider to the bearer token associated with the new credentials.
@ag-adampike ag-adampike pinned this issue Jul 26, 2024
@ag-adampike ag-adampike unpinned this issue Jul 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant