<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" docName="draft-ietf-scim-events-16" number="9967" ipr="trust200902" updates="7643, 7644" obsoletes="" submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth="3" symRefs="true" sortRefs="true" consensus="true" prepTime="2026-05-14T15:23:38" indexInclude="true" scripts="Common,Latin">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-scim-events-16" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9967" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="SCIM Profile for SETs">System for Cross-Domain Identity Management (SCIM) Profile for Security Event Tokens (SETs)</title>
    <seriesInfo name="RFC" value="9967" stream="IETF"/>
    <author fullname="Phil Hunt" initials="P." role="editor" surname="Hunt">
      <organization abbrev="Independent Id" showOnFrontPage="true">Independent Identity Inc</organization>
      <address>
        <email>phil.hunt@independentid.com</email>
      </address>
    </author>
    <author fullname="Nancy Cam-Winget" initials="N." surname="Cam-Winget">
      <organization abbrev="Cisco Systems" showOnFrontPage="true">Cisco Systems</organization>
      <address>
        <email>ncamwing@cisco.com</email>
      </address>
    </author>
    <author fullname="Mike Kiser" initials="M." surname="Kiser">
      <organization abbrev="Sailpoint" showOnFrontPage="true">Sailpoint Technologies</organization>
      <address>
        <email>mike.kiser@sailpoint.com</email>
      </address>
    </author>
    <author fullname="Jen Schreiber" initials="J." surname="Schreiber">
      <organization abbrev="Workday" showOnFrontPage="true">Workday, Inc.</organization>
      <address>
        <email>jwschreib@gmail.com</email>
      </address>
    </author>
    <date month="05" year="2026"/>
    <area>SEC</area>
    <workgroup>SCIM</workgroup>
    <keyword>Identity</keyword>
    <keyword>Event</keyword>
    <keyword>SET</keyword>
    <keyword>Provisioning</keyword>
    <keyword>Token</keyword>
    <keyword>SCIM</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
                This specification defines a set of System for Cross-domain Identity Management (SCIM)
                Security Events using the Security Event Token (SET) specification (RFC 8417) to enable
		the asynchronous exchange
                of messages between SCIM service providers and receivers.
      </t>
      <t indent="0" pn="section-abstract-2">
                This specification updates RFC 7643 by defining additional attributes for
                the "urn:ietf:params:scim:schemas:core:2.0:ServiceProviderConfig" schema, and it updates
                RFC 7644 with an optional new asynchronous SCIM request capability.
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9967" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2026 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction-and-overview">Introduction and Overview</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-notational-conventions">Notational Conventions</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.3">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.3.1"><xref derivedContent="1.3" format="counter" sectionFormat="of" target="section-1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-definitions">Definitions</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-scim-events">SCIM Events</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2">
              <li pn="section-toc.1-1.2.2.1">
                <t indent="0" pn="section-toc.1-1.2.2.1.1"><xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-identifying-the-subject-of-">Identifying the Subject of an Event</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.2">
                <t indent="0" pn="section-toc.1-1.2.2.2.1"><xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-common-event-attributes">Common Event Attributes</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.3">
                <t indent="0" pn="section-toc.1-1.2.2.3.1"><xref derivedContent="2.3" format="counter" sectionFormat="of" target="section-2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-scim-feed-events">SCIM Feed Events</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2.3.2">
                  <li pn="section-toc.1-1.2.2.3.2.1">
                    <t indent="0" pn="section-toc.1-1.2.2.3.2.1.1"><xref derivedContent="2.3.1" format="counter" sectionFormat="of" target="section-2.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-urnietfparamsscimeventfeeda">urn:ietf:params:scim:event:feed:add</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.3.2.2">
                    <t indent="0" pn="section-toc.1-1.2.2.3.2.2.1"><xref derivedContent="2.3.2" format="counter" sectionFormat="of" target="section-2.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-urnietfparamsscimeventfeedr">urn:ietf:params:scim:event:feed:remove</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.2.2.4">
                <t indent="0" pn="section-toc.1-1.2.2.4.1"><xref derivedContent="2.4" format="counter" sectionFormat="of" target="section-2.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-scim-provisioning-events">SCIM Provisioning Events</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2.4.2">
                  <li pn="section-toc.1-1.2.2.4.2.1">
                    <t indent="0" pn="section-toc.1-1.2.2.4.2.1.1"><xref derivedContent="2.4.1" format="counter" sectionFormat="of" target="section-2.4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-urnietfparamsscimeventprovc">urn:ietf:params:scim:event:prov:create:{notice|full}</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.4.2.2">
                    <t indent="0" pn="section-toc.1-1.2.2.4.2.2.1"><xref derivedContent="2.4.2" format="counter" sectionFormat="of" target="section-2.4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-urnietfparamsscimeventprovp">urn:ietf:params:scim:event:prov:patch:{notice|full}</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.4.2.3">
                    <t indent="0" pn="section-toc.1-1.2.2.4.2.3.1"><xref derivedContent="2.4.3" format="counter" sectionFormat="of" target="section-2.4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-urnietfparamsscimeventprovpu">urn:ietf:params:scim:event:prov:put:{notice|full}</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.4.2.4">
                    <t indent="0" pn="section-toc.1-1.2.2.4.2.4.1"><xref derivedContent="2.4.4" format="counter" sectionFormat="of" target="section-2.4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-urnietfparamsscimeventprovd">urn:ietf:params:scim:event:prov:delete</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.4.2.5">
                    <t indent="0" pn="section-toc.1-1.2.2.4.2.5.1"><xref derivedContent="2.4.5" format="counter" sectionFormat="of" target="section-2.4.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-urnietfparamsscimeventprova">urn:ietf:params:scim:event:prov:activate</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.4.2.6">
                    <t indent="0" pn="section-toc.1-1.2.2.4.2.6.1"><xref derivedContent="2.4.6" format="counter" sectionFormat="of" target="section-2.4.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-urnietfparamsscimeventprovde">urn:ietf:params:scim:event:prov:deactivate</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.2.2.5">
                <t indent="0" pn="section-toc.1-1.2.2.5.1"><xref derivedContent="2.5" format="counter" sectionFormat="of" target="section-2.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-miscellaneous-events">Miscellaneous Events</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2.5.2">
                  <li pn="section-toc.1-1.2.2.5.2.1">
                    <t indent="0" pn="section-toc.1-1.2.2.5.2.1.1"><xref derivedContent="2.5.1" format="counter" sectionFormat="of" target="section-2.5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-asynchronous-events">Asynchronous Events</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-set-txn-http-response-heade">Set-Txn HTTP Response Header for Asynchronous Requests</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-events-discovery-schema-for">Events Discovery Schema for Service Provider Configuration</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-privacy-considerations">Privacy Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t indent="0" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-scim-asynchronous-set-txn-h">SCIM Asynchronous Set-Txn Header Registration</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t indent="0" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-registering-event-capabilit">Registering Event Capability with SCIM Service Provider Configuration</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.3">
                <t indent="0" pn="section-toc.1-1.7.2.3.1"><xref derivedContent="7.3" format="counter" sectionFormat="of" target="section-7.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-creation-of-the-scim-event-">Creation of the SCIM Event URIs Registry</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.4">
                <t indent="0" pn="section-toc.1-1.7.2.4.1"><xref derivedContent="7.4" format="counter" sectionFormat="of" target="section-7.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-initial-contents-of-the-sci">Initial Contents of the SCIM Event URIs Registry</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-use-cases">Use Cases</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="A.1" format="counter" sectionFormat="of" target="section-appendix.a.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-domain-based-replication">Domain-Based Replication</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="A.2" format="counter" sectionFormat="of" target="section-appendix.a.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-coordinated-provisioning">Coordinated Provisioning</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="intro" toc="include" numbered="true" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction-and-overview">Introduction and Overview</name>
      <t indent="0" pn="section-1-1">
                This specification defines Security Events for SCIM service providers and receivers as specified by
                Security Event Tokens (SETs) <xref target="RFC8417" format="default" sectionFormat="of" derivedContent="RFC8417"/>. In this specification, SCIM Security
                Events include asynchronous request completion, resource replication, and
                provisioning coordination.
      </t>
      <t indent="0" pn="section-1-2">	      
                This specification defines the use of the HTTP header "Prefer: respond-async" <xref target="RFC7240" format="default" sectionFormat="of" derivedContent="RFC7240"/>
                to allow a SCIM client <xref target="RFC7644" format="default" sectionFormat="of" derivedContent="RFC7644"/> to request an asynchronous response (see <xref target="asyncRequest" format="default" sectionFormat="of" derivedContent="Section 2.5.1.1"/>).
      </t>
      <t indent="0" pn="section-1-3">
                Using the HTTP protocol, a SCIM client issues commands to a SCIM service
                provider using HTTP methods such as POST, PATCH, and DELETE <xref target="RFC7644" format="default" sectionFormat="of" derivedContent="RFC7644"/>
                that cause a state change to a SCIM resource. When multiple independent SCIM clients update SCIM
                resources, individual clients become out of date as state changes occur. Some clients may need to be
                informed of these changes for coordination or reconciliation purposes. This could be done using
                periodic SCIM GET requests over time, but this rapidly becomes problematic as the number of changes and the
                number of resources increases.
      </t>
      <t indent="0" pn="section-1-4">
                SCIM Events can be shared over an established event feed enabling receivers to monitor and trigger
                independent asynchronous action. This approach enables greater scale and timeliness, where only
                changed information is exchanged between parties.
      </t>
      <t indent="0" pn="section-1-5">
                A SET conveys information about a state change that has occurred at a SCIM service provider.
                That SET may be of interest to one or more receivers. But instead of interpreting SETs as commands, each
                Event Receiver is able to determine the best local follow-up action to take within its own context.
                For example, a receiver can reconcile schema and resource type differences between domains.
      </t>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-1.1">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t indent="0" pn="section-1.1-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
      <section anchor="notat" toc="include" numbered="true" removeInRFC="false" pn="section-1.2">
        <name slugifiedName="name-notational-conventions">Notational Conventions</name>
        <t indent="0" pn="section-1.2-1">
                    Throughout this document, all figures may contain spaces and extra
                    line wrapping for readability and space limitations. Similarly, some
                    URIs contained within examples have been shortened for space and
                    readability reasons.
        </t>
      </section>
      <section anchor="defs" toc="include" numbered="true" removeInRFC="false" pn="section-1.3">
        <name slugifiedName="name-definitions">Definitions</name>
        <t indent="0" pn="section-1.3-1">
                    This specification uses definitions from the following specifications:
        </t>
        <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-1.3-2">
          <li pn="section-1.3-2.1">"JSON Web Token (JWT)" <xref target="RFC7519" format="default" sectionFormat="of" derivedContent="RFC7519"/>, </li>
          <li pn="section-1.3-2.2">"Security Event Token (SET)" <xref target="RFC8417" format="default" sectionFormat="of" derivedContent="RFC8417"/>, and</li>
          <li pn="section-1.3-2.3">"System for Cross-domain Identity Management: Protocol" <xref target="RFC7644" format="default" sectionFormat="of" derivedContent="RFC7644"/>.
                    </li>
        </ul>
        <t indent="0" pn="section-1.3-3">
                    In JSON Web Tokens (JWTs) and Security Event Tokens, the term "claim" refers to JSON attribute
                    values contained in a JWT <xref target="RFC7519" format="default" sectionFormat="of" derivedContent="RFC7519"/> structure. The term "claim" in tokens is used
                    to indicate that an attribute value may not be verified and its accuracy can be questioned. In the
                    context of SCIM, this distinction is not made. For this specification, the terms "claims"
                    and "attributes" are interchangeable. For consistency, JWT and SET attributes registered by IANA will
                    continue to be called "claims", while event information attributes (i.e., those in an event payload) will be
                    referred to as "attributes".
        </t>
        <t indent="0" pn="section-1.3-4">
                    Additionally, the following terms are defined:
        </t>
        <dl newline="true" indent="3" spacing="normal" pn="section-1.3-5">
          <dt pn="section-1.3-5.1">Attributes and Claims:</dt>
          <dd pn="section-1.3-5.2">
                        The JWT specification <xref target="RFC7519" format="default" sectionFormat="of" derivedContent="RFC7519"/>, upon which SET is based, uses the term "claims" to
                        refer to attributes in a JSON Web Token. In contrast, SCIM uses the term "attributes" to refer to
                        JSON attributes. For the purposes of this document, the terms "attributes" and "claims" are equivalent.
                    </dd>
          <dt pn="section-1.3-5.3">Coordinated Provisioning (CP):</dt>
          <dd pn="section-1.3-5.4">
                        As defined in <xref target="coordination" format="default" sectionFormat="of" derivedContent="Appendix A.2"/>, in CP
                        relationships, an Event Publisher and Receiver typically exchange resource change events without
                        exchanging data (see <xref target="scimProvEvents" format="default" sectionFormat="of" derivedContent="Section 2.4"/>). For a receiver to know the value of the data,
                        the Event Receiver usually calls back
                        to the SCIM Event Publisher domain to receive a new copy of data (e.g., uses a SCIM GET request).
                    </dd>
          <dt pn="section-1.3-5.5">Domain-Based Replication (DBR):</dt>
          <dd pn="section-1.3-5.6">
                        As defined in <xref target="replication" format="default" sectionFormat="of" derivedContent="Appendix A.1"/>, in the DBR mode,
                        there is an administrative relationship spanning multiple operational domains; data
                        shared in Events typically uses the "full" mode variation of change events (see <xref target="scimProvEvents" format="default" sectionFormat="of" derivedContent="Section 2.4"/>) including
                        the "data" payload attribute. This eliminates the need for a callback
                        to retrieve additional data.
                    </dd>
          <dt pn="section-1.3-5.7">Event Feed / Event Stream:</dt>
          <dd pn="section-1.3-5.8">
                        An event feed (or equivalently an event stream) is a logical series of events shared with a unique receiving client.
                        A SET transfer (see <xref target="RFC8935" format="default" sectionFormat="of" derivedContent="RFC8935"/> and <xref target="RFC8936" format="default" sectionFormat="of" derivedContent="RFC8936"/>) service provider may
                        offer to allow Event Receivers to "subscribe" to specific event types or events about specific
                        resources (see feed events in <xref target="scimFeedEvents" format="default" sectionFormat="of" derivedContent="Section 2.3"/>).
                    </dd>
          <dt pn="section-1.3-5.9">Event Receiver:</dt>
          <dd pn="section-1.3-5.10">
                        An entity typically receives events as described in <xref target="RFC8935" format="default" sectionFormat="of" derivedContent="RFC8935"/> and <xref target="RFC8936" format="default" sectionFormat="of" derivedContent="RFC8936"/> or
                        via HTTP GET (see <xref target="asyncRequest" format="default" sectionFormat="of" derivedContent="Section 2.5.1.1"/>). In the case of push-based SET delivery
                        <xref target="RFC8935" format="default" sectionFormat="of" derivedContent="RFC8935"/>, the Event Receiver is an HTTP endpoint that receives requests.
                        In the case of poll-based SET delivery <xref target="RFC8936" format="default" sectionFormat="of" derivedContent="RFC8936"/>, the receiver is an HTTP client
                        that initiates HTTP requests to an Event Publisher endpoint.
                    </dd>
          <dt pn="section-1.3-5.11">Event Publisher:</dt>
          <dd pn="section-1.3-5.12">
                        A system that issues SETs based on a resource state change that has occurred at a SCIM
                        service provider. For example, events may be the result of a SCIM Create, Modify, or Delete operation
                        as defined in <xref section="3" target="RFC7644" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3" derivedContent="RFC7644"/>. A SCIM service provider may be an Event Publisher or an
                        independent service that aggregates events into Event Receiver feeds. As described above, when
                        using <xref target="RFC8935" format="default" sectionFormat="of" derivedContent="RFC8935"/>, the Event Publisher is an HTTP client that initiates HTTP POST
                        requests to a defined Event Receiver endpoint. When using <xref target="RFC8936" format="default" sectionFormat="of" derivedContent="RFC8936"/>, the Event
                        Publisher provides an HTTP endpoint, which a receiver may use to "poll" for Security Events.
                    </dd>
          <dt pn="section-1.3-5.13">SCIM Client:</dt>
          <dd pn="section-1.3-5.14">
                        An HTTP client that initiates SCIM protocol <xref target="RFC7644" format="default" sectionFormat="of" derivedContent="RFC7644"/> requests and receives
                        responses that may cause SCIM Events to be issued by the SCIM service provider. A SCIM client may
                        also be an Event Receiver, typically when making an asynchronous SCIM request (see <xref target="asyncRequest" format="default" sectionFormat="of" derivedContent="Section 2.5.1.1"/>).
                    </dd>
          <dt pn="section-1.3-5.15">SCIM Service Provider:</dt>
          <dd pn="section-1.3-5.16">
                        An HTTP server that implements the SCIM protocol <xref target="RFC7644" format="default" sectionFormat="of" derivedContent="RFC7644"/> and SCIM schema
                        <xref target="RFC7643" format="default" sectionFormat="of" derivedContent="RFC7643"/>. Upon processing a state change to a SCIM resource, it issues a SCIM Event
                        or causes an Event Publisher to issue a SCIM Event.
                    </dd>
          <dt pn="section-1.3-5.17">Security Event Token (SET):</dt>
          <dd pn="section-1.3-5.18">
                        As defined in <xref target="RFC8417" format="default" sectionFormat="of" derivedContent="RFC8417"/>.
                    </dd>
        </dl>
      </section>
    </section>
    <section anchor="scimEvents" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-scim-events">SCIM Events</name>
      <t indent="0" pn="section-2-1">
                A SCIM Event is a signal, in the form of a Security Event Token <xref target="RFC8417" format="default" sectionFormat="of" derivedContent="RFC8417"/>,
                that describes some event that has occurred. A SET event consists of a set of standard JWT "top-level"
                claims and an "events" claim that contains one or more event URI subclaims (JSON attributes) each with a
                JSON object containing relevant event information.
      </t>
      <t indent="0" pn="section-2-2">
                This specification defines the new URI prefix "urn:ietf:params:scim:event", which is used
                as the prefix for the defined SCIM Events (see <xref target="IANAevents" format="default" sectionFormat="of" derivedContent="Section 7.3"/>). Events are grouped
                into one of two sub-namespaces: "feed" (feed control notices) or "prov" (provisioning).
      </t>
      <section anchor="sub-id" numbered="true" toc="include" removeInRFC="false" pn="section-2.1">
        <name slugifiedName="name-identifying-the-subject-of-">Identifying the Subject of an Event</name>
        <t indent="0" pn="section-2.1-1">
                    SCIM Events <bcp14>MUST</bcp14> use the "sub_id" claim, defined by <xref target="RFC9493" format="default" sectionFormat="of" derivedContent="RFC9493"/>, to identify the
                    subject of events. The "sub_id" claim <bcp14>MUST</bcp14> be contained within the main JWT claims body and <bcp14>MUST NOT</bcp14> be located within an event
                    payload within the "events" claim. A SET with multiple event URIs indicates that the events
                    arise from the same transaction or resource state change for a single resource or subject.
        </t>
        <t indent="0" pn="section-2.1-2">
                    The JWT "sub" claim <bcp14>MUST NOT</bcp14> be used to identify subjects to prevent confusion with JWT
                    authorization tokens (originally recommended in <xref section="3" target="RFC8417" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8417#section-3" derivedContent="RFC8417"/>).
        </t>
        <figure anchor="example_subid" align="left" suppress-title="false" pn="figure-1">
          <name slugifiedName="name-example-scim-subject-id">Example SCIM Subject Id</name>
          <sourcecode type="json" markers="false" pn="section-2.1-3.1">
{
     "iss": "issuer.example.com",
     "iat": 1508184845,
     "aud": "aud.example.com",
     "sub_id": {
        "format": "scim",
        "uri": "/Users/2b2f880af6674ac284bae9381673d462",
        "externalId": "alice@example.com"
     },
     "events": {
       ...
     }
}</sourcecode>
        </figure>
        <t indent="0" pn="section-2.1-4">
                    Instead of "sub", the top-level claim "sub_id" <bcp14>SHALL</bcp14> be used. "sub_id" contains the subclaim attribute
                    "format" set to "scim" to indicate that the attributes present in the "sub_id"
                    object are SCIM attributes. The following "sub_id" attributes are defined:
        </t>
        <dl newline="true" spacing="normal" indent="3" pn="section-2.1-5">
          <dt pn="section-2.1-5.1">uri:</dt>
          <dd pn="section-2.1-5.2">
                        The SCIM relative path for the resource that usually consists of the resource type endpoint
                        plus the resource "id" (see <xref section="3.2" target="RFC7644" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.2" derivedContent="RFC7644"/>), for example,
                        "/Users/2b2f880af6674ac284bae9381673d462".
                        This attribute <bcp14>MUST</bcp14> be provided in a SCIM Event "sub_id" claim. Note that the relative path
                        is the path component after the SCIM service provider Base URI as defined in <xref target="RFC7644" section="1.3" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-1.3" derivedContent="RFC7644"/>.
                        In cases where the Event Receiver is unable to match a URI, the Event Receiver <bcp14>MAY</bcp14> issue a callback
                        to a previously agreed SCIM service provider Base URI plus the relative "uri" value and
                        perform a SCIM GET request per <xref target="RFC7644" section="3.4.1" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.4.1" derivedContent="RFC7644"/>.
                    </dd>
          <dt pn="section-2.1-5.3">externalId:</dt>
          <dd pn="section-2.1-5.4">
                        If known, the "externalId" value (defined in <xref target="RFC7643" section="3.1" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7643#section-3.1" derivedContent="RFC7643"/>) of the SCIM
                        resource that <bcp14>MAY</bcp14> be used by a receiver to identify the corresponding resource in the Event
                        Receiver's domain.
                    </dd>
          <dt pn="section-2.1-5.5">id:</dt>
          <dd pn="section-2.1-5.6">
                        The SCIM "id" attribute (defined in <xref section="3.1" target="RFC7643" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7643#section-3.1" derivedContent="RFC7643"/>) <bcp14>MAY</bcp14> be used for backwards
                        compatibility reasons in addition to the "uri" claim.
                    </dd>
        </dl>
        <t indent="0" pn="section-2.1-6">
                    In cases where SCIM identifiers ("id" and "externalId") are not enough to identify a
                    common resource between an Event Publisher and Event Receiver,
                    the "sub_id" object <bcp14>MAY</bcp14> contain attributes whose SCIM attribute types have "uniqueness" set to
                    "server" or "global" as per <xref section="7" target="RFC7643" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7643#section-7" derivedContent="RFC7643"/>. For example, attributes such as
                    "emails" or "userName" (defined in <xref section="4" target="RFC7643" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7643#section-4" derivedContent="RFC7643"/>) are unique
                    within a SCIM service provider. Such attributes should allow an Event Publisher and Event Receiver
                    to identify a commonly understood subject resource of an event.
        </t>
      </section>
      <section anchor="attributes" numbered="true" toc="include" removeInRFC="false" pn="section-2.2">
        <name slugifiedName="name-common-event-attributes">Common Event Attributes</name>
        <t indent="0" pn="section-2.2-1">The following attributes are available for all events defined. Some attributes are defined as SET/JWT
                    claims, while others are "event payload" claims as defined in <xref section="1.2" target="RFC8417" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8417#section-1.2" derivedContent="RFC8417"/>.
                    Only one of the claims, "data" or "attributes", <bcp14>MUST</bcp14> be provided depending on the event
                    definition.
        </t>
        <dl newline="true" spacing="normal" indent="3" pn="section-2.2-2">
          <dt pn="section-2.2-2.1">txn:</dt>
          <dd pn="section-2.2-2.2">
                        A SET-defined claim with a STRING value (see <xref section="2.2" target="RFC8417" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8417#section-2.2" derivedContent="RFC8417"/>)
                        that uniquely identifies a transaction originating at a SCIM service provider and/or its underlying data
                        repository or database where one or more SCIM Events may be subsequently issued. In contrast to
                        a "jti" claim (see <xref section="4.1.7" target="RFC7519" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7519#section-4.1.7" derivedContent="RFC7519"/>), which uniquely identifies
                        a token, the "txn" remains the same when
                        one or more SETs are generated for various purposes such as retransmission, publication to
                        multiple receivers, etc. A distinct state change or transaction within a SCIM service provider
                        <bcp14>MAY</bcp14> result in multiple SETs issued each with distinct "jit" values and a common
                        "txn" value. "txn" is <bcp14>REQUIRED</bcp14> to support asynchronous SCIM requests,
                        CP, and replication to disambiguate or detect duplicate SETs regarding
                        the same underlying transaction.
                    </dd>
          <dt pn="section-2.2-2.3">version:</dt>
          <dd pn="section-2.2-2.4">
                        The ETag version of the resource as a result of the event. Corresponds to the ETag
                        response header described in <xref target="RFC7644" section="3.14" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.14" derivedContent="RFC7644"/>.
                    </dd>
          <dt pn="section-2.2-2.5">data:</dt>
          <dd pn="section-2.2-2.6">
                        An event payload attribute that contains information described in the SCIM Bulk
                        Operations "data" attribute in <xref section="3.7" target="RFC7644" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.7" derivedContent="RFC7644"/>. The JSON object
                        contains the equivalent SCIM command processed by the SCIM service provider. For example, after
                        processing a SCIM Create operation, the data contained includes the final representation of the
                        entity created by the SCIM service provider including the assigned "id" value.
                    </dd>
          <dt pn="section-2.2-2.7">attributes:</dt>
          <dd pn="section-2.2-2.8">
                        A payload that contains an array of attributes that were added, revised, or removed. Names of
                        modified attributes <bcp14>SHOULD</bcp14> conform to the ABNF syntax rule for "path" 
                        (<xref target="RFC7644" section="3.5.2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.5.2" derivedContent="RFC7644"/>). For example:
                        <tt>"attributes": ["userName","emails","name.familyName"]</tt>.
                    </dd>
        </dl>
      </section>
      <section anchor="scimFeedEvents" numbered="true" toc="include" removeInRFC="false" pn="section-2.3">
        <name slugifiedName="name-scim-feed-events">SCIM Feed Events</name>
        <t indent="0" pn="section-2.3-1">
                    This section defines events related to changes in the content of an event feed such as
                    SCIM resources that are being added or removed from an event feed or events used in
                    Coordinated Provisioning scenarios where only a subset of entities are shared across an
                    event feed. The URI prefix for these events is "urn:ietf:params:scim:event:feed".
        </t>
        <section anchor="feedAdd" numbered="true" toc="include" removeInRFC="false" pn="section-2.3.1">
          <name slugifiedName="name-urnietfparamsscimeventfeeda">urn:ietf:params:scim:event:feed:add</name>
          <t indent="0" pn="section-2.3.1-1">The specified resource has been added to the event feed. A "feed:add" does not indicate that a
                        resource is new or has been recently created. For example,
                        an existing user has had a new role (e.g., CRM_User) added to
                        their profile, which has caused their resource to join a feed.
          </t>
          <figure anchor="exampleFeedAddEvent" align="left" suppress-title="false" pn="figure-2">
            <name slugifiedName="name-example-scim-feed-add-event">Example SCIM Feed Add Event</name>
            <sourcecode type="json" markers="false" pn="section-2.3.1-2.1">
{
  "jti": "6164f3bbf6ff41a88dc94f18cb0620e8",
  "txn": "b7b953f11cc6489bbfb87834747cc4c1",
  "sub_id": {
    "format": "scim",
    "uri": "/Users/2b2f880af6674ac284bae9381673d462",
    "externalId": "jdoe"
  },
  "events":{
    "urn:ietf:params:scim:event:feed:add": {}
  },
  "iat": 1458505044,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
          </figure>
        </section>
        <section anchor="feedRemove" numbered="true" toc="include" removeInRFC="false" pn="section-2.3.2">
          <name slugifiedName="name-urnietfparamsscimeventfeedr">urn:ietf:params:scim:event:feed:remove</name>
          <t indent="0" pn="section-2.3.2-1">The specified
                        resource has been removed from the feed. Removal does not indicate
                        that the resource was deleted or otherwise deactivated.
          </t>
          <figure anchor="exampleRemoveEvent" align="left" suppress-title="false" pn="figure-3">
            <name slugifiedName="name-example-scim-feed-remove-ev">Example SCIM Feed Remove Event</name>
            <sourcecode type="json" markers="false" pn="section-2.3.2-2.1">
{
  "jti": "6164f3bbf6ff41a88dc94f18cb0620e8",
  "sub_id": {
    "format": "scim",
    "uri": "/Users/2b2f880af6674ac284bae9381673d462",
    "externalId": "jdoe",
  },
  "events":{
    "urn:ietf:params:scim:event:feed:remove": {}
  },
  "iat": 1458505044,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
          </figure>
        </section>
      </section>
      <section anchor="scimProvEvents" numbered="true" toc="include" removeInRFC="false" pn="section-2.4">
        <name slugifiedName="name-scim-provisioning-events">SCIM Provisioning Events</name>
        <t indent="0" pn="section-2.4-1">
                    This section defines resource changes that have occurred within a SCIM service provider. These
                    events are used in both Domain-Based Replication (DBR) and Coordinated Provisioning (CP) mode. The
                    URI prefix for these events is "urn:ietf:params:scim:event:prov".
        </t>
        <t indent="0" pn="section-2.4-2">
                    When the "data" payload attribute is included for each of the following events, the
                    event URI <bcp14>MUST</bcp14> end with "full"; otherwise, the event URI ends with "notice". In
                    "full" mode, the set of values reflecting the final representation of the resource (such as would
                    be returned in a SCIM protocol response) at the service provider
                    are provided using the "data" attribute (see <xref target="exampleCreateEvent" format="default" sectionFormat="of" derivedContent="Figure 4"/>). In "notice"
		    mode, the
                    "attributes" attribute is returned and lists the set of attributes created or modified in the
                    request (see <xref target="exampleCreateEventDef" format="default" sectionFormat="of" derivedContent="Figure 5"/>). Exactly one of the payload attributes, "data"
                    or "attributes", <bcp14>MUST</bcp14> be present. Both <bcp14>MUST NOT</bcp14> be present simultaneously.
        </t>
        <section anchor="provCreate" numbered="true" toc="include" removeInRFC="false" pn="section-2.4.1">
          <name slugifiedName="name-urnietfparamsscimeventprovc">urn:ietf:params:scim:event:prov:create:{notice|full}</name>
          <t indent="0" pn="section-2.4.1-1">
                        The specified resource indicates that a new SCIM resource has been created by the SCIM service provider
                        and has been added to the event feed.
                        Note that because the event may be used for replication, the "id"
                        attribute that was assigned by the SCIM service provider is shared so that all replicas in the
                        domain <bcp14>MAY</bcp14> use the same resource identifier.
          </t>
          <figure anchor="exampleCreateEvent" align="left" suppress-title="false" pn="figure-4">
            <name slugifiedName="name-example-scim-create-event-f">Example SCIM Create Event (Full)</name>
            <sourcecode type="json" markers="false" pn="section-2.4.1-2.1">
{
  "jti": "4d3559ec67504aaba65d40b0363faad8",
  "iat": 1458496404,
  "iss":"https://scim.example.com",
  "aud":[
    "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754",
    "https://scim.example.com/Feeds/5d7604516b1d08641d7676ee7"
  ],
  "sub_id": {
    "format": "scim",
    "uri": "/Users/44f6142df96bd6ab61e7521d9",
     "externalId":"jdoe"
  },
  "events":{
    "urn:ietf:params:scim:event:prov:create:full":{
      "data":{
        "schemas":[ "urn:ietf:params:scim:schemas:core:2.0:User"],
        "emails":[
          {"type":"work","value":"jdoe@example.com"}
        ],
        "userName":"jdoe",
        "name":{
          "givenName":"John",
          "familyName":"Doe"
        }
      }
    }
  }
}</sourcecode>
          </figure>
          <figure anchor="exampleCreateEventDef" align="left" suppress-title="false" pn="figure-5">
            <name slugifiedName="name-example-scim-create-event-n">Example SCIM Create Event (Notice)</name>
            <sourcecode type="json" markers="false" pn="section-2.4.1-3.1">
{
  "jti": "4d3559ec67504aaba65d40b0363faad8",
  "iat": 1458496404,
  "iss":"https://scim.example.com",
  "aud":[
    "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754",
    "https://scim.example.com/Feeds/5d7604516b1d08641d7676ee7"
  ],
  "sub_id": {
    "format": "scim",
    "uri": "/Users/44f6142df96bd6ab61e7521d9",
    "externalId": "jdoe"
  },
  "events": {
    "urn:ietf:params:scim:event:prov:create:notice": {
      "attributes": [
        "id",
        "name",
        "userName",
        "password",
        "emails"
      ]
    }
  }
}</sourcecode>
          </figure>
          <t indent="0" pn="section-2.4.1-4">
                        The event shown in <xref target="exampleCreateEventDef" format="default" sectionFormat="of" derivedContent="Figure 5"/> notifies the Event Receiver of which
                        attributes have changed, but it does not convey
                        the actual information. The Event Receiver <bcp14>MAY</bcp14> retrieve that information
                        by performing a SCIM GET based on the "sub_id" value provided.
          </t>
        </section>
        <section anchor="provPatch" numbered="true" toc="include" removeInRFC="false" pn="section-2.4.2">
          <name slugifiedName="name-urnietfparamsscimeventprovp">urn:ietf:params:scim:event:prov:patch:{notice|full}</name>
          <t indent="0" pn="section-2.4.2-1">
                        The specified resource has been updated using SCIM PATCH. In "full" mode, the
                        "data" payload attribute is included (see <xref target="examplePatchEventFull" format="default" sectionFormat="of" derivedContent="Figure 6"/>).
                        When the event URI ends with "notice", the list of modified attributes is provided
                        (see <xref target="examplePatchEventBrief" format="default" sectionFormat="of" derivedContent="Figure 7"/>).
          </t>
          <figure anchor="examplePatchEventFull" align="left" suppress-title="false" pn="figure-6">
            <name slugifiedName="name-example-scim-patch-event-fu">Example SCIM Patch Event (Full)</name>
            <sourcecode type="json" markers="false" pn="section-2.4.2-2.1">
{
  "jti": "6164f3bbf6ff41a88dc94f18cb0620e8",
  "sub_id": {
    "format": "scim",
    "uri": "/Groups/176f397ec4c44b94b2cfcb759780b8c2",
    "externalId": "crmUsers"
  },
  "events":{
    "urn:ietf:params:scim:event:prov:patch:full": {
      "version": "a330bc54f0671c9",
      "data": {
        "schemas":
      ["urn:ietf:params:scim:api:messages:2.0:PatchOp"],
        "Operations":[{
          "op":"add",
          "path":"members",
          "value":[{
             "display": "Babs Jensen",
             "$ref": "/Users/2819c223...413861904646",
             "value": "2819c223-7f76-453a-919d-413861904646"
          }]
        }]
      }
    }
  },
  "iat": 1458505044,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
          </figure>
          <figure anchor="examplePatchEventBrief" align="left" suppress-title="false" pn="figure-7">
            <name slugifiedName="name-example-scim-patch-event-no">Example SCIM Patch Event (Notice)</name>
            <sourcecode type="json" markers="false" pn="section-2.4.2-3.1">
{
  "jti": "6164f3bbf6ff41a88dc94f18cb0620e8",
  "sub_id": {
    "format": "scim",
    "uri": "/Groups/176f397ec4c44b94b2cfcb759780b8c2",
    "externalId": "crmUsers"
  },
  "events":{
    "urn:ietf:params:scim:event:prov:patch:notice": {
      "attributes": ["members"],
      "version": "a330bc54f0671c9"
    }
  },
  "iat": 1458505044,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
          </figure>
        </section>
        <section anchor="provPut" numbered="true" toc="include" removeInRFC="false" pn="section-2.4.3">
          <name slugifiedName="name-urnietfparamsscimeventprovpu">urn:ietf:params:scim:event:prov:put:{notice|full}</name>
          <t indent="0" pn="section-2.4.3-1">
                        The specified resource has been updated (e.g., one or more attributes has
                        changed). In "full" mode, the SCIM PUT request body is included in the "data"
                        attribute (see <xref target="examplePutEventFull" format="default" sectionFormat="of" derivedContent="Figure 8"/>). In "notice" mode, the modified
                        attributes are listed using "attributes" (see <xref target="examplePutEventBrief" format="default" sectionFormat="of" derivedContent="Figure 9"/>).
          </t>
          <figure anchor="examplePutEventFull" align="left" suppress-title="false" pn="figure-8">
            <name slugifiedName="name-example-scim-put-event-full">Example SCIM Put Event (Full)</name>
            <sourcecode type="json" markers="false" pn="section-2.4.3-2.1">
{
  "jti": "6164f3bbf6ff41a88dc94f18cb0620e8",
  "sub_id": {
    "format": "scim",
    "uri": "/Users/2819c223-7f76-453a-919d-413861904646"
  },
  "events":{
    "urn:ietf:params:scim:event:prov:put:full": {
      "version": "a330bc54f0671c9",
      "data": {
        "schemas":["urn:ietf:params:scim:schemas:core:2.0:User"],
        "userName":"jdoe",
        "externalId":"jdoe",
        "name":{
           "formatted":"Mr. Jon Jack Doe III",
           "familyName":"Doe",
           "givenName":"Jon",
           "middleName":"Jack"
        },
        "roles":[],
        "emails":[
          {"value":"jdoe@example.com"},
          {"value":"anon@jdoe.org"}
        ]
      }
    }
  },
  "iat": 1458505044,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
          </figure>
          <figure anchor="examplePutEventBrief" align="left" suppress-title="false" pn="figure-9">
            <name slugifiedName="name-example-scim-put-event-noti">Example SCIM Put Event (Notice)</name>
            <sourcecode type="json" markers="false" pn="section-2.4.3-3.1">
{
  "jti": "6164f3bbf6ff41a88dc94f18cb0620e8",
  "sub_id": {
    "format": "scim",
    "uri": "/Users/2819c223-7f76-453a-919d-413861904646"
  },
  "events":{
    "urn:ietf:params:scim:event:prov:put:notice": {
      "version": "a330bc54f0671c9",
      "attributes": ["userName","externalId","name","roles","emails"]
    }
  },
  "iat": 1458505044,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
          </figure>
        </section>
        <section anchor="provDelete" numbered="true" toc="include" removeInRFC="false" pn="section-2.4.4">
          <name slugifiedName="name-urnietfparamsscimeventprovd">urn:ietf:params:scim:event:prov:delete</name>
          <t indent="0" pn="section-2.4.4-1">
                        The specified resource has been deleted from the SCIM service provider.
                        The resource is also removed from the feed. When a
                        DELETE is sent, a corresponding "feedRemove" <bcp14>SHALL NOT</bcp14> be issued. A delete
                        event has no payload attributes. Note that because the delete event has
                        no attributes, the qualifiers "full" and "notice" <bcp14>SHALL NOT</bcp14> be used.
          </t>
          <figure anchor="exampleDeleteEvent" align="left" suppress-title="false" pn="figure-10">
            <name slugifiedName="name-example-scim-delete-event">Example SCIM Delete Event</name>
            <sourcecode type="json" markers="false" pn="section-2.4.4-2.1">
{
  "jti": "6164f3bbf6ff41a88dc94f18cb0620e8",
  "sub_id": {
    "format": "scim",
    "uri": "/Users/2b2f880af6674ac284bae9381673d462",
    "externalId": "jDoe"
  },
  "events":{
    "urn:ietf:params:scim:event:prov:delete": {}
  },
  "iat": 1458505044,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
          </figure>
        </section>
        <section anchor="provActivate" numbered="true" toc="include" removeInRFC="false" pn="section-2.4.5">
          <name slugifiedName="name-urnietfparamsscimeventprova">urn:ietf:params:scim:event:prov:activate</name>
          <t indent="0" pn="section-2.4.5-1">
                        The specified resource (e.g., User) has been "activated". This does not necessarily reflect
                        any particular state change at the SCIM service provider but may simply indicate that the
                        account defined by the SCIM resource is ready for use as agreed upon by the Event Publisher and
                        Event Receiver. For example, an activated resource can represent an account that may be logged in.
          </t>
          <figure anchor="exampleActivateEvent" align="left" suppress-title="false" pn="figure-11">
            <name slugifiedName="name-example-scim-activate-event">Example SCIM Activate Event</name>
            <sourcecode type="json" markers="false" pn="section-2.4.5-2.1">
{
  "jti": "6164f3bbf6ff41a88dc94f18cb0620e8",
  "sub_id": {
    "format": "scim",
    "uri": "/Users/2b2f880af6674ac284bae9381673d462"
  },
  "events":{
    "urn:ietf:params:scim:event:prov:activate": {}
  },
  "iat": 1458505044,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
          </figure>
        </section>
        <section anchor="provDeactivate" numbered="true" toc="include" removeInRFC="false" pn="section-2.4.6">
          <name slugifiedName="name-urnietfparamsscimeventprovde">urn:ietf:params:scim:event:prov:deactivate</name>
          <t indent="0" pn="section-2.4.6-1">
                        The specified resource (e.g., User) has been deactivated and
                        disabled. The exact meaning <bcp14>SHOULD</bcp14> be agreed to by the Event Publisher
                        and its corresponding Event Receiver. Typically, this means the subject
                        may no longer have an active security session.
          </t>
        </section>
      </section>
      <section anchor="scimMisc" numbered="true" toc="include" removeInRFC="false" pn="section-2.5">
        <name slugifiedName="name-miscellaneous-events">Miscellaneous Events</name>
        <t indent="0" pn="section-2.5-1">
                    This section defines related miscellaneous events such as asynchronous request completion
                    that has occurred within a SCIM service provider. The URI prefix for these events is
                    "urn:ietf:params:scim:event:misc".
        </t>
        <section anchor="asyncEvent" numbered="true" toc="include" removeInRFC="false" pn="section-2.5.1">
          <name slugifiedName="name-asynchronous-events">Asynchronous Events</name>
          <section anchor="asyncRequest" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.5.1.1">
            <name slugifiedName="name-making-an-asynchronous-scim">Making an Asynchronous SCIM Request</name>
            <t indent="0" pn="section-2.5.1.1-1">
                            A SCIM client making SCIM HTTP requests defined in <xref target="RFC7644" section="3" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3" derivedContent="RFC7644"/> <bcp14>MAY</bcp14> request
                            asynchronous processing using the "Prefer" HTTP header as defined in 
                            <xref target="RFC7240" section="4.1" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7240#section-4.1" derivedContent="RFC7240"/>. The client may do this for a number of reasons such as avoiding
                            holding HTTP connections open during long requests because the result of the request is not
                            needed or the result is delivered to another entity for further action for coordination reasons.
            </t>
            <t indent="0" pn="section-2.5.1.1-2">
                            To initiate an asynchronous SCIM request, a normal SCIM protocol POST, PUT,
                            PATCH, or DELETE request is performed with the HTTP "Prefer" header set to
                            "respond-async" (<xref target="RFC7240" section="4.1" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7240#section-4.1" derivedContent="RFC7240"/>). The HTTP "Accept"
                            header <bcp14>MUST</bcp14> be ignored for purposes of an asynchronous response. Additionally, per
                            <xref target="RFC7240" section="4.3" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7240#section-4.3" derivedContent="RFC7240"/>, the "wait"
                            preference <bcp14>SHOULD</bcp14> be supported to establish a maximum time
                            before a SCIM service provider <bcp14>MAY</bcp14> choose to respond asynchronously.
            </t>
            <t indent="0" pn="section-2.5.1.1-3">
                            In response, the SCIM service provider returns either a normal SCIM response or
                            HTTP status code 202 (Accepted).
                            The asynchronous response <bcp14>MUST</bcp14> contain no response body. To enable correlation of the
                            future event, the HTTP response header "Set-Txn" (see <xref target="settxnheader" format="default" sectionFormat="of" derivedContent="Section 3"/>) is
                            returned with a value that <bcp14>MUST</bcp14> match the "txn" claim in a subsequent Security Event
                            Token. Per <xref target="RFC7240" section="3" sectionFormat="comma" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7240#section-3" derivedContent="RFC7240"/>, the response will also include the
                            "Preference-Applied" header. The "Location" header value <bcp14>MUST</bcp14> be one of the
                            following: (a) a URI where the completion SCIM Event Token <bcp14>MAY</bcp14> be retrieved using HTTP GET
                            or (b) the normal SCIM location header response specified by <xref target="RFC7644" format="default" sectionFormat="of" derivedContent="RFC7644"/>.
            </t>
            <t keepWithNext="true" indent="0" pn="section-2.5.1.1-4">
                            In the following non-normative example, a "Prefer" header is set to "respond-async":
            </t>
            <figure anchor="asyncRequestFigure" align="left" suppress-title="false" pn="figure-12">
              <name slugifiedName="name-example-asynchronous-scim-p">Example Asynchronous SCIM Protocol Request</name>
              <sourcecode type="json" markers="false" pn="section-2.5.1.1-5.1">
PUT /Users/2819c223-7f76-453a-919d-413861904646
Host: scim.example.com
Prefer: respond-async
Content-Type: application/scim+json
Authorization: Bearer h480djs93hd8

{
  "schemas":["urn:ietf:params:scim:schemas:core:2.0:User"],
  "id":"2819c223-7f76-453a-919d-413861904646",
  "userName":"bjensen",
  "externalId":"bjensen",
  "name":{
    "formatted":"Ms. Barbara J Jensen III"
  },
  "roles":[],
  "emails":[
    {
        "value":"bjensen@example.com"
    }
  ]
}</sourcecode>
            </figure>
            <t indent="0" pn="section-2.5.1.1-6">
                            The SCIM service provider responds with HTTP status code 202 (Accepted) and includes the Set-Txn header:
            </t>
            <figure align="left" suppress-title="false" pn="figure-13">
              <name slugifiedName="name-async-scim-request-with-pre">Async SCIM Request with Prefer Header</name>
              <sourcecode type="json" markers="false" pn="section-2.5.1.1-7.1">
HTTP/1.1 202 Accepted
Set-Txn: 734f0614e3274f288f93ac74119dcf78
Preference-Applied: respond-async
Location:
  "/Users/2819c223-7f76-453a-919d-413861904646"
</sourcecode>
            </figure>
          </section>
          <section anchor="asyncBulkRequest" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.5.1.2">
            <name slugifiedName="name-asynchronous-bulk-endpoint-">Asynchronous Bulk Endpoint Requests</name>
            <t indent="0" pn="section-2.5.1.2-1">
                            <xref section="3.7" target="RFC7644" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.7" derivedContent="RFC7644"/> provides the ability to submit multiple
                            SCIM operations in a single "bulk" request. When an asynchronous response is requested, a single
                            Asynchronous Request Completion Event <bcp14>MUST</bcp14> be generated for each requested operation. For example,
                            if a single "bulk" request had 10 operations, then 10 Asynchronous Event completion events
                            would be generated.
            </t>
            <t indent="0" pn="section-2.5.1.2-2">
                            The "txn" claim <bcp14>MUST</bcp14> be set to the value originally returned to the requesting SCIM client (see
                            <xref target="asyncRequest" format="default" sectionFormat="of" derivedContent="Section 2.5.1.1"/>) appended with a colon ":" and the zero-based array index of
                            the operation expressed in the "Operations" attribute of the
                            original bulk request. The "bulkId" parameter <bcp14>MUST NOT</bcp14> be used for this purpose as
                            it is a temporary identifier and is not required for every operation.
            </t>
            <t indent="0" pn="section-2.5.1.2-3">
                            For example, if a SCIM service provider received a bulk request with two or more operations,
                            and had a "txn" claim value of "2d80e537a3f64622b0347b641ebc8f44",
                            then the first Asynchronous Response Event Token representing the first operation has
                            a "txn" claim value of "2d80e537a3f64622b0347b641ebc8f44:0", the second operation has a value of
                            "2d80e537a3f64622b0347b641ebc8f44:1", and so on.
            </t>
            <t indent="0" pn="section-2.5.1.2-4">
                            If a SCIM service provider optimizes the sequence of operations (per <xref target="RFC7644" section="3.7" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.7" derivedContent="RFC7644"/>), the
                            Asynchronous Request Completion Events <bcp14>MAY</bcp14> be generated out of sequence from the
                            original request.  In this
                            case, the "txn" claims in those events <bcp14>MUST</bcp14> use operation numbers that correspond to the
                            order in the original request.
            </t>
          </section>
          <section numbered="true" removeInRFC="false" toc="exclude" pn="section-2.5.1.3">
            <name slugifiedName="name-urnietfparamsscimeventmisca">urn:ietf:params:scim:event:misc:asyncresp</name>
            <t indent="0" pn="section-2.5.1.3-1">
                        The Asynchronous Response Event signals the completion of a SCIM request. The event payload contains
                        the attributes defined in <xref target="RFC7644" section="3.7" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.7" derivedContent="RFC7644"/> and is the same as a
                        single SCIM Bulk Response Operation as per <xref target="RFC7644" section="3.7.3" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.7.3" derivedContent="RFC7644"/>. In the event, the "txn" claim <bcp14>MUST</bcp14> be
                        set to the value originally returned to the requesting SCIM client (see <xref target="asyncRequest" format="default" sectionFormat="of" derivedContent="Section 2.5.1.1"/>).
            </t>
            <figure anchor="exampleAsyncEvent" align="left" suppress-title="false" pn="figure-14">
              <name slugifiedName="name-example-scim-asynchronous-r">Example SCIM Asynchronous Response Event</name>
              <sourcecode type="json" markers="false" pn="section-2.5.1.3-2.1">
{
  "jti": "6164f3bbf6ff41a88dc94f18cb0620e8",
  "sub_id": {
    "format": "scim",
    "uri": "/Users/2819c223-7f76-453a-919d-413861904646"
  },
  "txn": "734f0614e3274f288f93ac74119dcf78",
  "events":{
    "urn:ietf:params:scim:event:misc:asyncresp": {
        "method": "PUT",
        "version": "W\/\"huJj29dMNgu3WXPD\"",
        "status": "200"
    }
  },
  "iat": 1458505044,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
            </figure>
            <t indent="0" pn="section-2.5.1.3-3">
                        If an error occurs during asynchronous processing,
                        the event operation <bcp14>MUST</bcp14> include a "response" attribute indicating a non-200-series HTTP status
                        as defined in <xref section="3.7" target="RFC7644" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.7" derivedContent="RFC7644"/>, and that "response" attribute <bcp14>MUST</bcp14> contain the
                        sub-attributes defined in <xref section="3.12" target="RFC7644" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.12" derivedContent="RFC7644"/>. The "status" attribute
                        of the event operation typically matches the "status" attribute of the response.
            </t>
            <figure anchor="exampleAsyncErrorEvent" align="left" suppress-title="false" pn="figure-15">
              <name slugifiedName="name-example-scim-asynchronous-e">Example SCIM Asynchronous Error Response Event</name>
              <sourcecode type="json" markers="false" pn="section-2.5.1.3-4.1">
{
 "jti": "6164f3bbf6ff41a88dc94f18cb0620e8",
 "sub_id": {
   "format": "scim",
   "uri": "/Users/2819c223-7f76-453a-919d-413861904646"
 },
 "txn": "734f0614e3274f288f93ac74119dcf78",
 "events":{
   "urn:ietf:params:scim:event:misc:asyncresp": {
       "method": "PUT",
       "version": "W\/\"huJj29dMNgu3WXPD\"",
       "status": "400",
       "response": {
           "schemas": [
               "urn:ietf:params:scim:api:messages:2.0:Error"
           ],
           "scimType":"invalidSyntax",
           "detail": "Request is unparsable",
           "status":"400"
       }
   }
 },
 "iat": 1458505044,
 "iss":"https://scim.example.com",
 "aud":[
  "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
 ]
}</sourcecode>
            </figure>
            <t indent="0" pn="section-2.5.1.3-5">The following four figures show asynchronous completion events for the example in 
                    <xref target="RFC7644" section="3.7.3" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.7.3" derivedContent="RFC7644"/>.</t>
            <figure anchor="exampleAsyncBulk1" align="left" suppress-title="false" pn="figure-16">
              <name slugifiedName="name-example-scim-asynchronous-re">Example SCIM Asynchronous Response Event Operation (1 of 4)</name>
              <sourcecode type="json" markers="false" pn="section-2.5.1.3-6.1">
{
  "jti": "dbae9d7506b34329aa7f2f0d3827848b",
  "sub_id": {
    "format": "scim",
    "uri": "/Users/92b725cd-9465-4e7d-8c16-01f8e146b87a"
  },
  "txn": "2d80e537a3f64622b0347b641ebc8f44:1",
  "events":{
    "urn:ietf:params:scim:event:misc:asyncresp": {
         "method": "POST",
         "bulkId": "qwerty",
         "version": "W\/\"oY4m4wn58tkVjJxK\"",
         "status": "201"
    }
  },
  "iat": 1458505044,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
            </figure>
            <figure anchor="exampleAsyncBulk2" align="left" suppress-title="false" pn="figure-17">
              <name slugifiedName="name-example-scim-asynchronous-res">Example SCIM Asynchronous Response Event Operation (2 of 4)</name>
              <sourcecode type="json" markers="false" pn="section-2.5.1.3-7.1">
{
  "jti": "ca977d05ba5c43929e3a69023d5392a9",
  "sub_id": {
    "format": "scim",
    "uri": "/Users/b7c14771-226c-4d05-8860-134711653041"
  },
  "txn": "2d80e537a3f64622b0347b641ebc8f44:2",
  "events":{
    "urn:ietf:params:scim:event:misc:asyncresp": {
          "method": "PUT",
          "version": "W\/\"huJj29dMNgu3WXPD\"",
          "status": "200"
    }
  },
  "iat": 1458505045,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
            </figure>
            <figure anchor="exampleAsyncBulk3" align="left" suppress-title="false" pn="figure-18">
              <name slugifiedName="name-example-scim-asynchronous-resp">Example SCIM Asynchronous Response Event Operation (3 of 4)</name>
              <sourcecode type="json" markers="false" pn="section-2.5.1.3-8.1">
{
  "jti": "4bb87d70a4ab463bbdcd1f99111cbbf1",
  "sub_id": {
    "format": "scim",
    "uri": "/Users/5d8d29d3-342c-4b5f-8683-a3cb6763ffcc"
  },
  "txn": "2d80e537a3f64622b0347b641ebc8f44:3",
  "events":{
    "urn:ietf:params:scim:event:misc:asyncresp": {
          "method": "PATCH",
          "version": "W\/\"huJj29dMNgu3WXPD\"",
          "status": "200"
    }
  },
  "iat": 1458505046,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
            </figure>
            <figure anchor="exampleAsyncBulk4" align="left" suppress-title="false" pn="figure-19">
              <name slugifiedName="name-example-scim-asynchronous-respo">Example SCIM Asynchronous Response Event Operation (4 of 4)</name>
              <sourcecode type="json" markers="false" pn="section-2.5.1.3-9.1">
{
  "jti": "6a7843a7f5244d0eb62ca38b641d9139",
  "sub_id": {
    "format": "scim",
    "uri": "/Users/e9025315-6bea-44e1-899c-1e07454e468b"
  },
  "txn": "2d80e537a3f64622b0347b641ebc8f44:4",
  "events":{
    "urn:ietf:params:scim:event:misc:asyncresp": {
          "method": "DELETE",
          "status": "204"
    }
  },
  "iat": 1458505047,
  "iss":"https://scim.example.com",
  "aud":[
   "https://scim.example.com/Feeds/98d52461fa5bbc879593b7754"
  ]
}</sourcecode>
            </figure>
          </section>
        </section>
      </section>
    </section>
    <section anchor="settxnheader" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-set-txn-http-response-heade">Set-Txn HTTP Response Header for Asynchronous Requests</name>
      <t indent="0" pn="section-3-1">
                This specification defines a new HTTP header field, "Set-Txn", which serves the purpose of conveying
                request completion information to SCIM HTTP clients that request an asynchronous response as described
                in <xref target="asyncRequest" format="default" sectionFormat="of" derivedContent="Section 2.5.1.1"/>.  The header field <bcp14>MUST</bcp14> be used in SCIM responses when HTTP
                status code 202 (Accepted) is being returned with no message body.
      </t>
      <t indent="0" pn="section-3-2">
                The "Set-Txn" HTTP header field value is a unique STRING (e.g., a Globally Unique Identifier (GUID)) used by the SCIM HTTP
                client to look for a matching SET event with a matching "txn" claim (see 
                <xref target="RFC8417" section="2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8417#section-2" derivedContent="RFC8417"/>) confirming the request
                completion status as described in <xref target="asyncRequest" format="default" sectionFormat="of" derivedContent="Section 2.5.1.1"/>.
      </t>
      <t indent="0" pn="section-3-3">
                Intermediaries <bcp14>SHOULD NOT</bcp14> insert, modify, or delete the field's value.
      </t>
      <t indent="0" pn="section-3-4">
                SCIM clients <bcp14>MAY</bcp14> ignore the header in cases where confirmation of completion is not required. For
                example, a SCIM client may simply not want to wait for synchronous completion.
      </t>
    </section>
    <section anchor="serviceProviderConfig" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-events-discovery-schema-for">Events Discovery Schema for Service Provider Configuration</name>
      <t indent="0" pn="section-4-1"><xref section="5" target="RFC7643" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7643#section-5" derivedContent="RFC7643"/> defines SCIM service provider configuration schemas. This section
            defines additional attributes that enable a SCIM client to discover the additional capabilities defined
            by this specification.</t>
      <dl newline="true" indent="3" spacing="normal" pn="section-4-2">
        <dt pn="section-4-2.1">securityEvents:</dt>
        <dd pn="section-4-2.2">
          <t indent="0" pn="section-4-2.2.1">
                        A SCIM complex attribute that specifies the available capabilities
                        related to asynchronous Security Events based on <xref target="RFC8417" format="default" sectionFormat="of" derivedContent="RFC8417"/>. This attribute is <bcp14>OPTIONAL</bcp14>, and
                        when absent, it indicates the SCIM service provider does not support or is not currently configured for Security Events.
                        The following sub-attributes are defined: </t>
          <dl newline="true" indent="3" spacing="normal" pn="section-4-2.2.2">
            <dt pn="section-4-2.2.2.1">asyncRequest:</dt>
            <dd pn="section-4-2.2.2.2">
              <t indent="0" pn="section-4-2.2.2.2.1">
                                A case-insensitive string value specifying one of the following:</t>
              <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-4-2.2.2.2.2">
                <li pn="section-4-2.2.2.2.2.1">"none" indicates that asynchronous SCIM requests defined in <xref target="asyncRequest" format="default" sectionFormat="of" derivedContent="Section 2.5.1.1"/> are not supported; </li>
                <li pn="section-4-2.2.2.2.2.2">"long" indicates that the server completes requests asynchronously at the server's discretion (e.g.,
                                    based on a max wait time); and</li>
                <li pn="section-4-2.2.2.2.2.3">"request" indicates that the server completes requests asynchronously when requested by
                                        the SCIM client.</li>
              </ul>
            </dd>
            <dt pn="section-4-2.2.2.3">eventUris:</dt>
            <dd pn="section-4-2.2.2.4">
              <t indent="0" pn="section-4-2.2.2.4.1">
                                A multivalued string listing the SET Event URIs (defined in <xref target="RFC8417" format="default" sectionFormat="of" derivedContent="RFC8417"/>) that
                                the server is capable of generating and delivering via a SET Stream (see <xref target="RFC8935" format="default" sectionFormat="of" derivedContent="RFC8935"/> and <xref target="RFC8936" format="default" sectionFormat="of" derivedContent="RFC8936"/>).
                                This information is informational only. Stream registration and configuration are out of scope of this specification.
              </t>
            </dd>
          </dl>
        </dd>
      </dl>
    </section>
    <section anchor="Security" toc="include" numbered="true" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-5-1">
                As this specification is based upon the SETs specification and the associated delivery specifications, the
                following security considerations are also applicable to this specification:
      </t>
      <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-5-2">
        <li pn="section-5-2.1">
          <xref section="5" target="RFC8417" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8417#section-5" derivedContent="RFC8417"/> (Security Event Token)</li>
        <li pn="section-5-2.2">
          <xref section="5" target="RFC8935" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8935#section-5" derivedContent="RFC8935"/> (Push-Based SET Delivery Using HTTP)</li>
        <li pn="section-5-2.3">
          <xref section="4" target="RFC8936" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8936#section-4" derivedContent="RFC8936"/> (Poll-Based SET Delivery Using HTTP) </li>
      </ul>
      <t indent="0" pn="section-5-3">
                SETs may contain sensitive information, including Personally Identifiable Information (PII). In such
                cases, SET Transmitters and SET Recipients <bcp14>MUST</bcp14> protect the confidentiality of the SET contents in transit
                using TLS <xref target="BCP195" format="default" sectionFormat="of" derivedContent="BCP195"/>.
      </t>
      <t indent="0" pn="section-5-4">
                When coordinating provisioning between entities, the long-term series of changes may be critical to the
                information integrity and recovery requirements of both sides. To address this, Event Publishers can
                make events available for receivers for longer periods of time than might typically be used for recovering
                from momentary delivery failures and retries per <xref target="RFC8935" format="default" sectionFormat="of" derivedContent="RFC8935"/> or <xref target="RFC8936" format="default" sectionFormat="of" derivedContent="RFC8936"/>.
                Similarly, Event Receivers <bcp14>MUST</bcp14> ensure events are persisted
                directly or indirectly to meet local recovery needs before acknowledging the SET Events were received.
      </t>
      <t indent="0" pn="section-5-5">
                An attacker might leverage transaction and/or signal information contained in a SET Event Publisher or
                Receiver system. To mitigate this, access to event recovery and forwarding <bcp14>MUST</bcp14> be limited to the
                parties needed to support recovery or SET forwarding.
      </t>
      <t indent="0" pn="section-5-6">
                When SET Events are transferred in such a way that the Event Publisher is not communicating directly to the
                Event Receiver, it may become possible for an attacker or other system to insert an event.
                To mitigate, Event Receivers <bcp14>MUST</bcp14> verify the originator of a SET using JSON Web
              Signature (JWS) <xref target="RFC7515" format="default" sectionFormat="of" derivedContent="RFC7515"/>
                signatures when the Event Publisher is not communicating directly with the Event Receiver.
                Validating event signatures may also be useful for auditing purposes as signed SET Events are protected from tampering in the event that
                an intermediate system, such as a TLS-terminating proxy, decrypts the SET payload before sending it onward 
                to its intended recipient.
      </t>
      <t indent="0" pn="section-5-7">
                In operation, some SCIM resources such as SCIM Groups may have a high rate of change. For example, groups
                with more than a few thousand member values could lead to excessive change rates, which could lead to a
                loss of SET Events between Event Publishers and Event Receivers. To mitigate this risk, consider the
                following to help with throughput issues:
      </t>
      <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-5-8">
        <li pn="section-5-8.1">
                    The use of SCIM PUT (<xref section="3.5.1" target="RFC7644" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.5.1" derivedContent="RFC7644"/>), particularly with large SCIM Groups,
                    can result in excessive data being
                    conveyed in Security Event payloads. Instead, it is <bcp14>RECOMMENDED</bcp14> to use SCIM PATCH 
                    (<xref target="RFC7644" section="3.5.2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.5.2" derivedContent="RFC7644"/>) to focus on updating and notifying about changed information. Alternatively,
                    use SCIM PUT Event Notice (urn:ietf:params:scim:event:prov:put:notice) as a trigger to later retrieve the
                    full information when needed.
                </li>
        <li pn="section-5-8.2">
                    Use SCIM Patch Event Notice (urn:ietf:params:scim:event:prov:patch:notice) to reduce event content combined with
                    periodic SCIM GETs (see <xref section="3.4" target="RFC7644" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7644#section-3.4" derivedContent="RFC7644"/>) to retrieve current group state.
                </li>
        <li pn="section-5-8.3">
		  
                    Aggregate multiple PATCH Events into a single event. If providing the exact date of each membership change
                    is not critical, consider using a PATCH to aggregate multiple membership changes into a single event.                </li>
      </ul>
      <t indent="0" pn="section-5-9">
                When using asynchronous SCIM requests (see <xref target="asyncRequest" format="default" sectionFormat="of" derivedContent="Section 2.5.1.1"/>), a SCIM service provider returns
                a SCIM Accepted response with a URI for retrieving the event result. An unauthorized entity or attacker
                could obtain Asynchronous Request Completion Event information by querying the asynchronous operation
                result endpoint used by a SCIM service provider. To mitigate, the returned URI endpoint <bcp14>MUST</bcp14> be
                protected and requires an HTTP Authorization header or some other form of client authentication.
      </t>
    </section>
    <section anchor="Privacy" toc="include" numbered="true" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-privacy-considerations">Privacy Considerations</name>
      <t indent="0" pn="section-6-1">
                As this specification is based upon the SET specification and the associated delivery specifications, the following
                privacy considerations are also applicable to this specification:
      </t>
      <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-6-2">
        <li pn="section-6-2.1">
          <xref section="6" target="RFC8417" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8417#section-6" derivedContent="RFC8417"/> (Security Event Token)</li>
        <li pn="section-6-2.2">
          <xref section="6" target="RFC8935" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8935#section-6" derivedContent="RFC8935"/> (Push-Based SET Delivery Using HTTP)</li>
        <li pn="section-6-2.3">
          <xref section="5" target="RFC8936" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8936#section-5" derivedContent="RFC8936"/> (Poll-Based SET Delivery Using HTTP) </li>
      </ul>
      <t indent="0" pn="section-6-3">
                This specification enables the sharing of information between domains; therefore, it is assumed
                that implementers and deployers are operating under one of the following scenarios:
      </t>
      <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-6-4">
        <li pn="section-6-4.1">A common administrative domain where there is one administrative owner of the data. In these cases,
                the goal is to protect privacy and security of the owner and user data by keeping information
                systems coordinated and up to date. For example, the domains decide to use DBR
                mode to keep employee information synchronized.
                </li>
        <li pn="section-6-4.2">In a cooperative or coordinated relationship, parties have decided to share a limited amount
                of data and/or signals for the benefits of their users. Depending on end-user consent, information
                is shared on an as-authorized and/or as-needed basis. For example, the domains agree to use CP mode that exchanges things such as account status or specific minimal attribute information
                that must be fetched on request after receiving notice of a change. This enables authorization to
                be verified each time data is transferred.
                </li>
      </ul>
      <t indent="0" pn="section-6-5">In general, the sharing of SCIM Event information falls within a pre-existing SCIM client and service
            provider relationship and carries no additional personal information.</t>
    </section>
    <section anchor="IANA" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <section anchor="IANAheader" numbered="true" toc="include" removeInRFC="false" pn="section-7.1">
        <name slugifiedName="name-scim-asynchronous-set-txn-h">SCIM Asynchronous Set-Txn Header Registration</name>
        <t indent="0" pn="section-7.1-1">
                    This specification registers the HTTP "Set-Txn" field name in the "Hypertext Transfer Protocol (HTTP) Field Name Registry" defined in <xref target="RFC9110" section="16.3.1" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc9110#section-16.3.1" derivedContent="RFC9110"/>.
        </t>
        <dl newline="false" spacing="compact" indent="3" pn="section-7.1-2">
          <dt pn="section-7.1-2.1">Field name:</dt>
          <dd pn="section-7.1-2.2">Set-Txn</dd>
          <dt pn="section-7.1-2.3">Status:</dt>
          <dd pn="section-7.1-2.4">permanent</dd>
          <dt pn="section-7.1-2.5">Reference:</dt>
          <dd pn="section-7.1-2.6">
            <xref target="settxnheader" format="default" sectionFormat="of" derivedContent="Section 3"/> of RFC 9967.</dd>
        </dl>
      </section>
      <section anchor="spcRegister" numbered="true" toc="include" removeInRFC="false" pn="section-7.2">
        <name slugifiedName="name-registering-event-capabilit">Registering Event Capability with SCIM Service Provider Configuration</name>
        <t indent="0" pn="section-7.2-1">A reference to <xref target="serviceProviderConfig" format="default" sectionFormat="of" derivedContent="Section 4"/> of this document has been added to the "urn:ietf:params:scim:schemas:core:2.0:ServiceProviderConfig" entry in the "SCIM Server-Related Schema URIs" registry (<xref section="10.4" target="RFC7643" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7643#section-10.4" derivedContent="RFC7643"/>) under the "System for Cross-domain Identity Management (SCIM) Schema URIs" registry group.
        </t>
      </section>
      <section anchor="IANAevents" numbered="true" toc="include" removeInRFC="false" pn="section-7.3">
        <name slugifiedName="name-creation-of-the-scim-event-">Creation of the SCIM Event URIs Registry</name>
        <t indent="0" pn="section-7.3-1">
                    IANA has created a new registry called "SCIM Event URIs" under the "System for Cross-domain Identity
                    Management (SCIM) Schema URIs" registry group (<xref target="RFC7643" section="10.1" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7643#section-10.1" derivedContent="RFC7643"/>)
                    at <eref brackets="angle" target="https://www.iana.org/assignments/scim"/>.
        </t>
        <t indent="0" pn="section-7.3-2">
                    The registration procedure is Expert Review <xref target="RFC8126" format="default" sectionFormat="of" derivedContent="RFC8126"/>. New registrations for this registry are evaluated by designated expert(s)
                    for relevance to SCIM-based systems and to avoid possible duplication or conflict
                    with other event definitions that may lie outside SCIM (e.g., Shared Signals <xref target="SSF" format="default" sectionFormat="of" derivedContent="SSF"/>).
        </t>
        <dl newline="true" indent="3" spacing="normal" pn="section-7.3-3">
          <dt pn="section-7.3-3.1">Namespace ID:</dt>
          <dd pn="section-7.3-3.2">
                        The sub-namespace ID of "event" is assigned within the "scim" namespace.
                    </dd>
          <dt pn="section-7.3-3.3">Syntactic Structure:</dt>
          <dd pn="section-7.3-3.4">
            <t indent="0" pn="section-7.3-3.4.1">The Namespace Specific String (NSS) of all URNs that use the "event" Namespace ID has the
                            following structure:</t>
            <sourcecode markers="false" pn="section-7.3-3.4.2">
"urn:ietf:params:scim:event:{class}:{name}:{other}"</sourcecode>
            <t indent="0" pn="section-7.3-3.4.3">The keywords have the following meaning:</t>
            <dl newline="true" indent="3" spacing="normal" pn="section-7.3-3.4.4">
              <dt pn="section-7.3-3.4.4.1">class</dt>
              <dd pn="section-7.3-3.4.4.2">The class of events, which is one of: "feed", "prov", or "misc".</dd>
              <dt pn="section-7.3-3.4.4.3">name</dt>
              <dd pn="section-7.3-3.4.4.4">An ASCII string that conforms to URN syntax requirements (see <xref target="RFC8141" format="default" sectionFormat="of" derivedContent="RFC8141"/>)
                                and defines a descriptive event name (e.g., "create").</dd>
              <dt pn="section-7.3-3.4.4.5">other</dt>
              <dd pn="section-7.3-3.4.4.6">An optional ASCII string that conforms to URN syntax requirements (see <xref target="RFC8141" format="default" sectionFormat="of" derivedContent="RFC8141"/>)
                                and serves as an additional sub-category or qualifier, for example, "full" and "notice".</dd>
            </dl>
          </dd>
          <dt pn="section-7.3-3.5">Identifier Uniqueness Considerations:</dt>
          <dd pn="section-7.3-3.6">The designated contact is responsible for reviewing and enforcing uniqueness.</dd>
          <dt pn="section-7.3-3.7">Identifier Persistence Considerations:</dt>
          <dd pn="section-7.3-3.8">Once a name has been allocated, it <bcp14>MUST NOT</bcp14> be
                        reallocated for a different purpose. The rules provided for the
                        assignment of values within a sub-namespace <bcp14>MUST</bcp14> be constructed
                        so that the meaning of values cannot change. This registration
                        mechanism is not appropriate for naming values whose meaning may
                        change over time.</dd>
          <dt pn="section-7.3-3.9">Registration Format:</dt>
          <dd pn="section-7.3-3.10">
            <t indent="0" pn="section-7.3-3.10.1">An event registration <bcp14>MUST</bcp14> include the following fields:</t>
            <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-7.3-3.10.2">
              <li pn="section-7.3-3.10.2.1">Event URI</li>
              <li pn="section-7.3-3.10.2.2">Descriptive name</li>
              <li pn="section-7.3-3.10.2.3">Reference to event definition</li>
            </ul>
          </dd>
        </dl>
      </section>
      <section anchor="initialEvents" numbered="true" toc="include" removeInRFC="false" pn="section-7.4">
        <name slugifiedName="name-initial-contents-of-the-sci">Initial Contents of the SCIM Event URIs Registry</name>
        <t keepWithNext="true" indent="0" pn="section-7.4-1">IANA has added the following initial entries to the "SCIM Event URIs" registry:</t>
        <table align="center" pn="table-1">
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Event URI</th>
              <th align="left" colspan="1" rowspan="1">Name</th>
              <th align="left" colspan="1" rowspan="1">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:feed:add</td>
              <td align="left" colspan="1" rowspan="1">Resource added to Feed Event</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="feedAdd" format="default" sectionFormat="of" derivedContent="Section 2.3.1"/> of RFC 9967
                        </td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:feed:remove</td>
              <td align="left" colspan="1" rowspan="1">Remove resource from Feed Event</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="feedRemove" format="default" sectionFormat="of" derivedContent="Section 2.3.2"/> of RFC 9967
                        </td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:prov:create:
                            notice</td>
              <td align="left" colspan="1" rowspan="1">New Resource Event (notice only)</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="provCreate" format="default" sectionFormat="of" derivedContent="Section 2.4.1"/> of RFC 9967
                        </td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:prov:create:
                            full</td>
              <td align="left" colspan="1" rowspan="1">New Resource Event (full data)</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="provCreate" format="default" sectionFormat="of" derivedContent="Section 2.4.1"/> of RFC 9967
                        </td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:prov:patch:
                            notice</td>
              <td align="left" colspan="1" rowspan="1">Resource Patch Event (notice only)</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="provPatch" format="default" sectionFormat="of" derivedContent="Section 2.4.2"/> of RFC 9967
                        </td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:prov:patch:
                            full</td>
              <td align="left" colspan="1" rowspan="1">Resource Patch Event (full data)</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="provPatch" format="default" sectionFormat="of" derivedContent="Section 2.4.2"/> of RFC 9967
                        </td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:prov:put:
                            notice</td>
              <td align="left" colspan="1" rowspan="1">Resource Put Event (notice only)</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="provPut" format="default" sectionFormat="of" derivedContent="Section 2.4.3"/> of RFC 9967
                        </td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:prov:put:full</td>
              <td align="left" colspan="1" rowspan="1">Resource Put Event (full data)</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="provPut" format="default" sectionFormat="of" derivedContent="Section 2.4.3"/> of RFC 9967
                        </td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:prov:delete</td>
              <td align="left" colspan="1" rowspan="1">Resource Deleted Event</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="provDelete" format="default" sectionFormat="of" derivedContent="Section 2.4.4"/> of RFC 9967
                        </td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:prov:activate</td>
              <td align="left" colspan="1" rowspan="1">Resource Activated Event</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="provActivate" format="default" sectionFormat="of" derivedContent="Section 2.4.5"/> of RFC 9967
                        </td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:prov:deactivate</td>
              <td align="left" colspan="1" rowspan="1">Resource Deactivated Event</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="provDeactivate" format="default" sectionFormat="of" derivedContent="Section 2.4.6"/> of RFC 9967
                        </td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">urn:ietf:params:scim:event:misc:asyncresp</td>
              <td align="left" colspan="1" rowspan="1">Asynchronous Request Completion</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="asyncEvent" format="default" sectionFormat="of" derivedContent="Section 2.5.1"/> of RFC 9967
                        </td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.hunt-idevent-scim" to="SCIM-EVENT-EXT"/>
    <references pn="section-8">
      <name slugifiedName="name-references">References</name>
      <references pn="section-8.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <referencegroup anchor="BCP195" target="https://www.rfc-editor.org/info/bcp195" derivedAnchor="BCP195">
          <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996" quoteTitle="true">
            <front>
              <title>Deprecating TLS 1.0 and TLS 1.1</title>
              <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
              <author fullname="S. Farrell" initials="S." surname="Farrell"/>
              <date month="March" year="2021"/>
              <abstract>
                <t indent="0">This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
                <t indent="0">This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
                <t indent="0">This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="195"/>
            <seriesInfo name="RFC" value="8996"/>
            <seriesInfo name="DOI" value="10.17487/RFC8996"/>
          </reference>
          <reference anchor="RFC9325" target="https://www.rfc-editor.org/info/rfc9325" quoteTitle="true">
            <front>
              <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
              <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
              <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
              <author fullname="T. Fossati" initials="T." surname="Fossati"/>
              <date month="November" year="2022"/>
              <abstract>
                <t indent="0">Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
                <t indent="0">RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="195"/>
            <seriesInfo name="RFC" value="9325"/>
            <seriesInfo name="DOI" value="10.17487/RFC9325"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7240" target="https://www.rfc-editor.org/info/rfc7240" quoteTitle="true" derivedAnchor="RFC7240">
          <front>
            <title>Prefer Header for HTTP</title>
            <author fullname="J. Snell" initials="J." surname="Snell"/>
            <date month="June" year="2014"/>
            <abstract>
              <t indent="0">This specification defines an HTTP header field that can be used by a client to request that certain behaviors be employed by a server while processing a request.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7240"/>
          <seriesInfo name="DOI" value="10.17487/RFC7240"/>
        </reference>
        <reference anchor="RFC7515" target="https://www.rfc-editor.org/info/rfc7515" quoteTitle="true" derivedAnchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t indent="0">JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519" quoteTitle="true" derivedAnchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t indent="0">JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7643" target="https://www.rfc-editor.org/info/rfc7643" quoteTitle="true" derivedAnchor="RFC7643">
          <front>
            <title>System for Cross-domain Identity Management: Core Schema</title>
            <author fullname="P. Hunt" initials="P." role="editor" surname="Hunt"/>
            <author fullname="K. Grizzle" initials="K." surname="Grizzle"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="September" year="2015"/>
            <abstract>
              <t indent="0">The System for Cross-domain Identity Management (SCIM) specifications are designed to make identity management in cloud-based applications and services easier. The specification suite builds upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. Its intent is to reduce the cost and complexity of user management operations by providing a common user schema and extension model as well as binding documents to provide patterns for exchanging this schema using HTTP.</t>
              <t indent="0">This document provides a platform-neutral schema and extension model for representing users and groups and other resource types in JSON format. This schema is intended for exchange and use with cloud service providers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7643"/>
          <seriesInfo name="DOI" value="10.17487/RFC7643"/>
        </reference>
        <reference anchor="RFC7644" target="https://www.rfc-editor.org/info/rfc7644" quoteTitle="true" derivedAnchor="RFC7644">
          <front>
            <title>System for Cross-domain Identity Management: Protocol</title>
            <author fullname="P. Hunt" initials="P." role="editor" surname="Hunt"/>
            <author fullname="K. Grizzle" initials="K." surname="Grizzle"/>
            <author fullname="M. Ansari" initials="M." surname="Ansari"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="September" year="2015"/>
            <abstract>
              <t indent="0">The System for Cross-domain Identity Management (SCIM) specification is an HTTP-based protocol that makes managing identities in multi-domain scenarios easier to support via a standardized service. Examples include, but are not limited to, enterprise-to-cloud service providers and inter-cloud scenarios. The specification suite seeks to build upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. SCIM's intent is to reduce the cost and complexity of user management operations by providing a common user schema, an extension model, and a service protocol defined by this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7644"/>
          <seriesInfo name="DOI" value="10.17487/RFC7644"/>
        </reference>
        <reference anchor="RFC8141" target="https://www.rfc-editor.org/info/rfc8141" quoteTitle="true" derivedAnchor="RFC8141">
          <front>
            <title>Uniform Resource Names (URNs)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="April" year="2017"/>
            <abstract>
              <t indent="0">A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that is assigned under the "urn" URI scheme and a particular URN namespace, with the intent that the URN will be a persistent, location-independent resource identifier. With regard to URN syntax, this document defines the canonical syntax for URNs (in a way that is consistent with URI syntax), specifies methods for determining URN-equivalence, and discusses URI conformance. With regard to URN namespaces, this document specifies a method for defining a URN namespace and associating it with a namespace identifier, and it describes procedures for registering namespace identifiers with the Internet Assigned Numbers Authority (IANA). This document obsoletes both RFCs 2141 and 3406.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8141"/>
          <seriesInfo name="DOI" value="10.17487/RFC8141"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8417" target="https://www.rfc-editor.org/info/rfc8417" quoteTitle="true" derivedAnchor="RFC8417">
          <front>
            <title>Security Event Token (SET)</title>
            <author fullname="P. Hunt" initials="P." role="editor" surname="Hunt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="W. Denniss" initials="W." surname="Denniss"/>
            <author fullname="M. Ansari" initials="M." surname="Ansari"/>
            <date month="July" year="2018"/>
            <abstract>
              <t indent="0">This specification defines the Security Event Token (SET) data structure. A SET describes statements of fact from the perspective of an issuer about a subject. These statements of fact represent an event that occurred directly to or about a security subject, for example, a statement about the issuance or revocation of a token on behalf of a subject. This specification is intended to enable representing security- and identity-related events. A SET is a JSON Web Token (JWT), which can be optionally signed and/or encrypted. SETs can be distributed via protocols such as HTTP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8417"/>
          <seriesInfo name="DOI" value="10.17487/RFC8417"/>
        </reference>
        <reference anchor="RFC8935" target="https://www.rfc-editor.org/info/rfc8935" quoteTitle="true" derivedAnchor="RFC8935">
          <front>
            <title>Push-Based Security Event Token (SET) Delivery Using HTTP</title>
            <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
            <author fullname="M. Jones" initials="M." role="editor" surname="Jones"/>
            <author fullname="M. Scurtescu" initials="M." surname="Scurtescu"/>
            <author fullname="M. Ansari" initials="M." surname="Ansari"/>
            <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
            <date month="November" year="2020"/>
            <abstract>
              <t indent="0">This specification defines how a Security Event Token (SET) can be delivered to an intended recipient using HTTP POST over TLS. The SET is transmitted in the body of an HTTP POST request to an endpoint operated by the recipient, and the recipient indicates successful or failed transmission via the HTTP response.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8935"/>
          <seriesInfo name="DOI" value="10.17487/RFC8935"/>
        </reference>
        <reference anchor="RFC8936" target="https://www.rfc-editor.org/info/rfc8936" quoteTitle="true" derivedAnchor="RFC8936">
          <front>
            <title>Poll-Based Security Event Token (SET) Delivery Using HTTP</title>
            <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
            <author fullname="M. Jones" initials="M." role="editor" surname="Jones"/>
            <author fullname="M. Scurtescu" initials="M." surname="Scurtescu"/>
            <author fullname="M. Ansari" initials="M." surname="Ansari"/>
            <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
            <date month="November" year="2020"/>
            <abstract>
              <t indent="0">This specification defines how a series of Security Event Tokens (SETs) can be delivered to an intended recipient using HTTP POST over TLS initiated as a poll by the recipient. The specification also defines how delivery can be assured, subject to the SET Recipient's need for assurance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8936"/>
          <seriesInfo name="DOI" value="10.17487/RFC8936"/>
        </reference>
        <reference anchor="RFC9110" target="https://www.rfc-editor.org/info/rfc9110" quoteTitle="true" derivedAnchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t indent="0">The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t indent="0">This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9493" target="https://www.rfc-editor.org/info/rfc9493" quoteTitle="true" derivedAnchor="RFC9493">
          <front>
            <title>Subject Identifiers for Security Event Tokens</title>
            <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
            <author fullname="M. Scurtescu" initials="M." surname="Scurtescu"/>
            <author fullname="P. Jain" initials="P." surname="Jain"/>
            <date month="December" year="2023"/>
            <abstract>
              <t indent="0">Security events communicated within Security Event Tokens may support a variety of identifiers to identify subjects related to the event. This specification formalizes the notion of Subject Identifiers as structured information that describes a subject and named formats that define the syntax and semantics for encoding Subject Identifiers as JSON objects. It also establishes a registry for defining and allocating names for such formats as well as the JSON Web Token (JWT) "sub_id" Claim.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9493"/>
          <seriesInfo name="DOI" value="10.17487/RFC9493"/>
        </reference>
      </references>
      <references pn="section-8.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" quoteTitle="true" derivedAnchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t indent="0">Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t indent="0">To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t indent="0">This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="I-D.hunt-idevent-scim" target="https://datatracker.ietf.org/doc/html/draft-hunt-idevent-scim-00" quoteTitle="true" derivedAnchor="SCIM-EVENT-EXT">
          <front>
            <title>SCIM Event Extension</title>
            <author initials="P." surname="Hunt" fullname="Phil Hunt" role="editor">
              <organization showOnFrontPage="true">Oracle</organization>
            </author>
            <author initials="W." surname="Denniss" fullname="William Denniss">
              <organization showOnFrontPage="true">Google</organization>
            </author>
            <author initials="M." surname="Ansari" fullname="Morteza Ansari">
              <organization showOnFrontPage="true">Cisco</organization>
            </author>
            <date month="March" day="20" year="2016"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hunt-idevent-scim-00"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="SSF" target="https://openid.net/specs/openid-sharedsignals-framework-1_0.html" quoteTitle="true" derivedAnchor="SSF">
          <front>
            <title>OpenID Shared Signals Framework Specification 1.0</title>
            <author fullname="A. Tulshibagwale"/>
            <author fullname="T. Cappalli"/>
            <author fullname="M. Scurtescu"/>
            <author fullname="A. Backman"/>
            <author fullname="J. Bradley"/>
            <author fullname="S. Miel"/>
            <date day="29" month="August" year="2025"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="modes" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-use-cases">Use Cases</name>
      <t indent="0" pn="section-appendix.a-1">
                SCIM Events may be used in a number of ways. The following non-normative sections describe some of
                the expected uses.
      </t>
      <section anchor="replication" toc="include" numbered="true" removeInRFC="false" pn="section-appendix.a.1">
        <name slugifiedName="name-domain-based-replication">Domain-Based Replication</name>
        <t indent="0" pn="section-appendix.a.1-1">
                    The objective of DBR events is to synchronize resource changes between
                    SCIM service providers in a common administrative domain. In this mode, complete information about
                    modified resources are shared between replicas for immediate processing.
        </t>
        <figure align="left" anchor="dbrSequence" suppress-title="false" pn="figure-20">
          <name slugifiedName="name-domain-based-replication-se">Domain-Based Replication Sequence</name>
          <artset pn="section-appendix.a.1-2.1">
            <artwork type="ascii-art" align="left" pn="section-appendix.a.1-2.1.1">
+-------------+   +---------------------+   +------------------------+
|SCIM Client A|   |SCIM Service Provider|   |Service Provider Replica|
+-------------+   +---------------------+   +------------------------+
       |                     |                           |
       | [1] SCIM Operation  |                           |
       |--------------------&gt;|                           |
       | [2] SCIM Response   |                           |
       |&lt;--------------------|                           |
       |                     |                           |
       |                     | [3] Event SCIM:prov:&lt;op&gt;  |
       |                     |          id:xyz           |
       |                     |- - - - - - - - - - - - - &gt;|
       |                     |                           |
       |                     |     [4] Update local node |--+
       |                     |                           |  |
       |                     |                           |&lt;-+
       |                     |                           |
       v                     v                           v</artwork>
            <artwork align="center" type="svg" pn="section-appendix.a.1-2.1.2">
                    <svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" viewBox="0 0 697.0 550.0">
                <rect x="0.0" y="0.0" width="697.0" height="594.0" fill="#FFFFFF" fill-opacity="1.0"/>
                <g class="ParticipantView">
                  <rect x="60.0" y="60.0" width="129.0" height="61.0" rx="5.0" ry="5.0" fill="#FFFFFF" stroke="#000000" stroke-width="1.0"/>
                  <text x="124.5" y="90.5" text-anchor="middle" font-family="sans-serif" font-size="14.0" fill="#000000" fill-opacity="1.0">SCIM Client A</text>
                </g>
                <g class="ParticipantView">
                  <rect x="209.0" y="50.0" width="180.0" height="82.0" rx="5.0" ry="5.0" fill="#FFFFFF" stroke="#000000" stroke-width="1.0"/>
                  <text x="299.0" y="82.5" text-anchor="middle" font-family="sans-serif" font-size="14.0" fill="#000000" fill-opacity="1.0">SCIM</text>
                  <text x="299.0" y="99.5" text-anchor="middle" font-family="sans-serif" font-size="14.0" fill="#000000" fill-opacity="1.0">Service Provider</text>
                </g>
                <g class="ParticipantView">
                  <rect x="409.0" y="60.0" width="228.0" height="61.0" rx="5.0" ry="5.0" fill="#FFFFFF" stroke="#000000" stroke-width="1.0"/>
                  <text x="523.0" y="90.5" text-anchor="middle" font-family="sans-serif" font-size="14.0" fill="#000000" fill-opacity="1.0">Service Provider Replica</text>
                </g>
                <g class="LifelineView">
                  <line x1="124.0" y1="121.0" x2="126.0" y2="472.0" stroke-dasharray="20.0, 10.0" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                </g>
                <g class="LifelineView">
                  <line x1="298.0" y1="132.0" x2="300.0" y2="462.0" stroke-dasharray="20.0, 10.0" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                </g>
                <g class="LifelineView">
                  <line x1="522.0" y1="121.0" x2="524.0" y2="472.0" stroke-dasharray="20.0, 10.0" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                </g>
                <g class="LifelineActivationBoxView">
                  <rect x="291.0" y="193.0" width="16.0" height="115.0" fill="#FFFFFF" fill-opacity="1.0" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                </g>
                <g class="LifelineActivationBoxView">
                  <rect x="515.0" y="300.0" width="16.0" height="56.0" fill="#FFFFFF" fill-opacity="1.0" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                </g>
                <g class="SignalMessageView">
                  <text x="208.0" y="180.5" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">[1] SCIM Operation</text>
                </g>
                <g class="SignalMessageView">
                  <text x="208.0" y="225.5" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">[2] SCIM Response</text>
                </g>
                <g class="SignalMessageView">
                  <text x="415.0" y="271.0" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">[3] Event SCIM:prov:&lt;op&gt;</text>
                  <text x="415.0" y="287.0" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">id:xyz</text>
                </g>
                <g class="SignalMessageView">
                  <text x="511.0" y="332.5" text-anchor="end" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">[4] Update local node</text>
                </g>
                <g class="SignalLineView">
                  <path d="M 281.0,192.0 L 291.0,197.5 L 281.0,202.0 L 281.0, 192.0" fill="#000000" fill-opacity="1.0"/>
                  <line x1="125.0" y1="197.5" x2="281.0" y2="197.5" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                </g>
                <g class="SignalLineView">
                  <path d="M 135.0,237.0 L 125.0,242.5 L 135.0,247.0 L 135.0, 237.0" fill="#000000" fill-opacity="1.0"/>
                  <line x1="135.0" y1="242.5" x2="291.0" y2="242.5" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                </g>
                <g class="SignalLineView">
                  <path d="M 505.0,299.0 L 515.0,304.5 L 505.0,309.0 L 505.0, 299.0" fill="#000000" fill-opacity="1.0"/>
                  <line x1="307.0" y1="304.5" x2="505.0" y2="304.5" stroke-dasharray="5.0, 3.0" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                </g>
                <g class="SignalLineView">
                  <path d="M 541.0,342.0 L 530.5,346.5 L 541.0,352.0 L 541.0,342.0" fill="#000000" fill-opacity="1.0"/>
                  <line x1="531.5" y1="324.5" x2="570.5" y2="324.5" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  <line x1="570.5" y1="346.5" x2="541.0" y2="346.5" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  <path d="M 570.5,324.5 Q 580.5,324.5 580.5, 334.5 L 580.5 336.5 Q 580.5,346.5 570.5,346.5" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                </g>
              </svg>
            </artwork>
          </artset>
        </figure>
        <t indent="0" pn="section-appendix.a.1-3">
                    From a security perspective, it is assumed that servers sharing DBR events are secured by a common
                    access policy and all servers are required to be up to date.
                    From a privacy perspective, because all servers are in the same administrative domain, the primary objective
                    is to keep individual service provider nodes or clusters synchronized.
        </t>
      </section>
      <section anchor="coordination" toc="include" numbered="true" removeInRFC="false" pn="section-appendix.a.2">
        <name slugifiedName="name-coordinated-provisioning">Coordinated Provisioning</name>
        <t indent="0" pn="section-appendix.a.2-1">
                    In CP, SCIM resource change events perform the function of change
                    notification without the need to provide raw data. In any Event Publisher and Receiver
                    relationship, the set of SCIM resources (e.g., Users) that are linked or coordinated is managed
                    within the context of an event feed and may be a subset of the total set of resources on
                    either side. For example, an event feed could be limited to users who have consented to the sharing
                    of information between domains. To support capability, "feed" specific events are defined to indicate
                    the addition and removal of SCIM resources from a feed. For example, when a user consents to
                    the sharing of information between domains, events about the User may be added to the feed
                    between the Event Publisher and Receiver.
        </t>
        <figure align="left" suppress-title="false" pn="figure-21">
          <name slugifiedName="name-coordinated-provisioning-se">Coordinated Provisioning Sequence</name>
          <artset pn="section-appendix.a.2-2.1">
            <artwork type="ascii-art" align="center" pn="section-appendix.a.2-2.1.1">
+-----------+  +---------------+  +-----------------+  +---------------+
|SCIM Client|  | SCIM Service  |  | Event Receiver  |  | Coord. Action |
|           |  |   Provider    |  |                 |  |   Endpoint    |
+-----------+  +---------------+  +-----------------+  +---------------+
      |                |                   |                   |
      | [1] SCIM       |                   |                   |
      |     Operation  |                   |                   |
      |---------------&gt;|                   |                   |
      |                |                   |                   |
      | [2] SCIM       |                   |                   |
      |     Response   |                   |                   |
      |&lt;---------------|                   |                   |
      |                |                   |                   |
      |                +=== loop ==========+===================+
      |                |                   |                   |
      |                | [3] Event         |                   |
      |                | SCIM:prov:&lt;op&gt;    |                   |
      |                | id:xyz            |                   |
      |                |- - - - - - - - - &gt;|                   |
      |                |                   |                   |
      |                |                   | Note: Receiver    |
      |                |                   | may accumulate    |
      |                |                   | events for        |
      |                |                   | periodic action.  |
      |                |                   |                   |
      |                | [4] SCIM GET &lt;id&gt; |                   |
      |                |&lt;------------------|                   |
      |                |                   |                   |
      |                | [5] Filtered      |                   |
      |                |     Resource      |                   |
      |                |     Response      |                   |
      |                |------------------&gt;|                   |
      |                |                   |                   |
      |                |                   | [6] Coordinated   |
      |                |                   |     Action        |
      |                |                   |------------------&gt;|
      |                |                   |                   |
      |                +=== end loop ======+===================+
      v                v                   v                   v</artwork>
            <artwork type="svg" align="center" pn="section-appendix.a.2-2.1.2">
                       <svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" viewBox="0 0 660 620">
                <g transform="scale(0.7237)">
                  <rect x="0.0" y="0.0" width="912.0" height="857.0" fill="#FFFFFF" fill-opacity="1.0"/>
                  <g class="ParticipantView">
                    <rect x="60.0" y="70.0" width="154.0" height="61.0" rx="5.0" ry="5.0" fill="#FFFFFF" stroke="#000000" stroke-width="1.0"/>
                    <text x="137.0" y="100.5" text-anchor="middle" font-family="sans-serif" font-size="14.0" fill="#000000" fill-opacity="1.0">SCIM Client</text>
                  </g>
                  <g class="ParticipantView">
                    <rect x="234.0" y="60.0" width="180.0" height="82.0" rx="5.0" ry="5.0" fill="#FFFFFF" stroke="#000000" stroke-width="1.0"/>
                    <text x="324.0" y="92.5" text-anchor="middle" font-family="sans-serif" font-size="14.0" fill="#000000" fill-opacity="1.0">SCIM</text>
                    <text x="324.0" y="109.5" text-anchor="middle" font-family="sans-serif" font-size="14.0" fill="#000000" fill-opacity="1.0">Service Provider</text>
                  </g>
                  <g class="ParticipantView">
                    <rect x="434.0" y="60.0" width="177.0" height="82.0" rx="5.0" ry="5.0" fill="#FFFFFF" stroke="#000000" stroke-width="1.0"/>
                    <text x="522.5" y="105.5" text-anchor="middle" font-family="sans-serif" font-size="14.0" fill="#000000" fill-opacity="1.0">Event Receiver</text>
                  </g>
                  <g class="ParticipantView">
                    <rect x="631.0" y="70.0" width="221.0" height="61.0" rx="5.0" ry="5.0" fill="#FFFFFF" stroke="#000000" stroke-width="1.0"/>
                    <text x="741.5" y="100.5" text-anchor="middle" font-family="sans-serif" font-size="14.0" fill="#000000" fill-opacity="1.0">Coord. Action Endpoint</text>
                  </g>
                  <g class="LifelineView">
                    <line x1="136.0" y1="131.0" x2="138.0" y2="735.0" stroke-dasharray="20.0, 10.0" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="LifelineView">
                    <line x1="323.0" y1="142.0" x2="325.0" y2="725.0" stroke-dasharray="20.0, 10.0" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="LifelineView">
                    <line x1="522.0" y1="142.0" x2="524.0" y2="725.0" stroke-dasharray="20.0, 10.0" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="LifelineView">
                    <line x1="741.0" y1="131.0" x2="743.0" y2="735.0" stroke-dasharray="20.0, 10.0" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="LifelineActivationBoxView">
                    <rect x="316.0" y="213.0" width="16.0" height="160.0" fill="#FFFFFF" fill-opacity="1.0" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="LifelineActivationBoxView">
                    <rect x="515.0" y="365.0" width="16.0" height="234.0" fill="#FFFFFF" fill-opacity="1.0" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="InteractionFrameView">
                    <rect x="269.0" y="287.0" width="528.0" height="328.0" fill="#FFFFFF" fill-opacity="0.0"/>
                    <path d="M 269.0,287.0 L 324.0,287.0 L 324.0,295.0 L 318.0,303.0 L 269.0,303.0" fill="#FFFFFF" fill-opacity="1.0" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                    <rect x="269.0" y="287.0" width="528.0" height="328.0" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                    <text x="296.5" y="295.0" text-anchor="middle" font-family="sans-serif" font-size="12.0" fill="#000000" fill-opacity="1.0">    loop    </text>
                    <text x="344.0" y="295.0" text-anchor="start" font-family="sans-serif" font-size="12.0" fill="#000000" fill-opacity="1.0"/>
                  </g>
                  <g class="SignalMessageView">
                    <text x="226.5" y="200.5" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">[1] SCIM Operation</text>
                  </g>
                  <g class="SignalMessageView">
                    <text x="226.5" y="245.5" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">[2] SCIM Response</text>
                  </g>
                  <g class="SignalMessageView">
                    <text x="427.5" y="336.0" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">[3] Event SCIM:prov:&lt;op&gt;</text>
                    <text x="427.5" y="352.0" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">id:xyz</text>
                  </g>
                  <g class="SignalMessageView">
                    <text x="419.5" y="471.5" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">[4] SCIM GET &lt;id&gt;</text>
                  </g>
                  <g class="SignalMessageView">
                    <text x="419.5" y="517.0" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">[5] Filtered</text>
                    <text x="419.5" y="533.0" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">Resource Response</text>
                  </g>
                  <g class="SignalMessageView">
                    <text x="636.5" y="578.5" text-anchor="middle" font-family="sans-serif" font-size="13.0" fill="#000000" fill-opacity="1.0">[6] Coordinated Action</text>
                  </g>
                  <g class="SignalLineView">
                    <path d="M 306.0,212.0 L 316.0,217.5 L 306.0,222.0 L 306.0, 212.0" fill="#000000" fill-opacity="1.0"/>
                    <line x1="137.0" y1="217.5" x2="306.0" y2="217.5" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="SignalLineView">
                    <path d="M 147.0,257.0 L 137.0,262.5 L 147.0,267.0 L 147.0, 257.0" fill="#000000" fill-opacity="1.0"/>
                    <line x1="147.0" y1="262.5" x2="316.0" y2="262.5" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="SignalLineView">
                    <path d="M 505.0,364.0 L 515.0,369.5 L 505.0,374.0 L 505.0, 364.0" fill="#000000" fill-opacity="1.0"/>
                    <line x1="332.0" y1="369.5" x2="505.0" y2="369.5" stroke-dasharray="5.0, 3.0" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="SignalLineView">
                    <path d="M 334.0,483.0 L 324.0,488.5 L 334.0,493.0 L 334.0, 483.0" fill="#000000" fill-opacity="1.0"/>
                    <line x1="334.0" y1="488.5" x2="515.0" y2="488.5" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="SignalLineView">
                    <path d="M 505.0,545.0 L 515.0,550.5 L 505.0,555.0 L 505.0, 545.0" fill="#000000" fill-opacity="1.0"/>
                    <line x1="324.0" y1="550.5" x2="505.0" y2="550.5" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="SignalLineView">
                    <path d="M 732.0,590.0 L 742.0,595.5 L 732.0,600.0 L 732.0, 590.0" fill="#000000" fill-opacity="1.0"/>
                    <line x1="531.0" y1="595.5" x2="732.0" y2="595.5" fill="none" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                  </g>
                  <g class="NoteView">
                    <rect x="429.0" y="379.0" width="188.0" height="54.0" rx="5.0" ry="5.0" fill="#FFFFFF" fill-opacity="1.0" stroke="#000000" stroke-opacity="1.0" stroke-width="1.0"/>
                    <text x="443.0" y="397.5" text-anchor="start" font-family="sans-serif" font-size="14.0" fill="#000000" fill-opacity="1.0">Receiver may accumulate</text>
                    <text x="443.0" y="414.5" text-anchor="start" font-family="sans-serif" font-size="14.0" fill="#000000" fill-opacity="1.0">events for periodic action.</text>
                  </g>
                </g>
              </svg>
            </artwork>
          </artset>
        </figure>
        <t indent="0" pn="section-appendix.a.2-3">
                    In CP mode, the receiver of an event must call back to the originating SCIM service provider
                    (e.g., using a SCIM GET request) to reconcile the newly changed resource in
                    order to obtain the changes.
        </t>
        <t indent="0" pn="section-appendix.a.2-4">
                    CP has the following benefits:
        </t>
        <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-appendix.a.2-5">
          <li pn="section-appendix.a.2-5.1">
                        Differences in schema (e.g., attributes) between domains. For example, a receiving domain may
                        only be interested in or allowed to access to a few attributes (e.g., role-based access data) to
                        enable access to an application.
                    </li>
          <li pn="section-appendix.a.2-5.2">
                        Different Event Receivers may have differing needs when accessing information and thus may be assigned
                        varying access rights. Minimal information events combined with callbacks for data allows
                        data filtering to be applied.
                    </li>
          <li pn="section-appendix.a.2-5.3">
                        Receivers can take independent action such as deciding which attributes or resource life cycle
                        changes to accept. For example, in the case of a conflict, a receiver can prioritize one domain
                        source over another.
                    </li>
          <li pn="section-appendix.a.2-5.4">
                        A receiver may throttle or buffer changes rather than act immediately on a notification. For
                        example, for a frequently changing resource, the
                        receiver may choose to make a scheduled SCIM GET for resources that have been marked "dirty" by
                        events received in the last scheduled cycle.
                    </li>
        </ul>
        <t indent="0" pn="section-appendix.a.2-6">
                    A disadvantage of the CP approach is that it may be considered costly in the sense that each event
                    received might trigger a callback to the event issuer. This cost should be weighed against the cost
                    producing filtered information in each event for each receiver. Furthermore, a receiver is not required
                    to make a callback on every provisioning event.
        </t>
        <t indent="0" pn="section-appendix.a.2-7">
                    It is assumed that an underlying relationship between domains exists that permits the exchange of
                    personal information and credentials. For example, in a cross-domain scenario, a SCIM service provider
                    would have been previously authorized to perform SCIM provisioning operations and publish change events.
                    As such, appropriate confidentiality and privacy agreements should be in place between the domains.
        </t>
        <t indent="0" pn="section-appendix.a.2-8">
                    When sharing information between parties, CP Events minimize the information shared in each message and
                    require the Security Event Receiver to receive more information from the Event Publisher as needed.
                    In this way, the Event Receiver is able to have regular access to information through normal
                    SCIM protocol access restrictions. The Event Receiver and Publisher may agree to communicate these
                    updates through a variety of transmission methods such as push- and pull-based HTTP <xref target="RFC8935" format="default" sectionFormat="of" derivedContent="RFC8935"/>
          <xref target="RFC8936" format="default" sectionFormat="of" derivedContent="RFC8936"/> or HTTP GET (see <xref target="asyncRequest" format="default" sectionFormat="of" derivedContent="Section 2.5.1.1"/>); streaming technologies
                    (e.g., Kafka or Kinesis); or webhooks such as in the <xref target="SSF" format="default" sectionFormat="of" derivedContent="SSF">Shared Signals Framework</xref>.
        </t>
      </section>
    </section>
    <section anchor="Acknowledgements" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.b-1">The authors would like to thank the following contributors:</t>
      <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-appendix.b-2">
        <li pn="section-appendix.b-2.1">
          <t indent="0" pn="section-appendix.b-2.1.1"><contact fullname="Morteza Ansari"/> and <contact fullname="William Denniss"/>, who contributed significantly to
                <xref target="I-D.hunt-idevent-scim" format="default" sectionFormat="of" derivedContent="SCIM-EVENT-EXT"/> upon which this
                document is based.</t>
        </li>
        <li pn="section-appendix.b-2.2">The participants of the SCIM Working Group and the
                IETF id-event mailing list for their support of this specification.</li>
        <li pn="section-appendix.b-2.3">
          <t indent="0" pn="section-appendix.b-2.3.1"><contact fullname="Deb Cooley"/>, <contact fullname="Dean Saxe"/>, <contact fullname="Elliot Lear"/>,
                <contact fullname="Pamela Dingle"/>, <contact fullname="Mark                 Nottingham"/>, <contact fullname="R Gideon"/>, <contact fullname="Paulo Jorge Correia"/>, <contact fullname="Shuping                 Peng"/>, <contact fullname="Elwyn Davies"/>, <contact fullname="Luigi Lannone"/>, <contact fullname="Mohamed                 Boucadair"/>, <contact fullname="Roman Danyliw"/>, <contact fullname="Ketan Talaulikar"/>, <contact fullname="Mahesh                 Jethanandani"/>, and <contact fullname="Mike Bishop"/> for
                their write-ups and reviews.</t>
        </li>
      </ul>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Phil Hunt" initials="P." role="editor" surname="Hunt">
        <organization abbrev="Independent Id" showOnFrontPage="true">Independent Identity Inc</organization>
        <address>
          <email>phil.hunt@independentid.com</email>
        </address>
      </author>
      <author fullname="Nancy Cam-Winget" initials="N." surname="Cam-Winget">
        <organization abbrev="Cisco Systems" showOnFrontPage="true">Cisco Systems</organization>
        <address>
          <email>ncamwing@cisco.com</email>
        </address>
      </author>
      <author fullname="Mike Kiser" initials="M." surname="Kiser">
        <organization abbrev="Sailpoint" showOnFrontPage="true">Sailpoint Technologies</organization>
        <address>
          <email>mike.kiser@sailpoint.com</email>
        </address>
      </author>
      <author fullname="Jen Schreiber" initials="J." surname="Schreiber">
        <organization abbrev="Workday" showOnFrontPage="true">Workday, Inc.</organization>
        <address>
          <email>jwschreib@gmail.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
