{"id":191947,"date":"2025-06-30T05:00:46","date_gmt":"2025-06-30T10:00:46","guid":{"rendered":"https:\/\/www.een.com\/?p=191947"},"modified":"2025-07-03T10:20:44","modified_gmt":"2025-07-03T15:20:44","slug":"scim-and-cloud-vms","status":"publish","type":"post","link":"https:\/\/www.een.com\/sv\/blog\/scim-and-cloud-vms\/","title":{"rendered":"Save time and simplify VMS access with SCIM and SSO."},"content":{"rendered":"\n<p>Managing user access to business systems has long been a frustrating, time-consuming, and error-prone process for any large organization \u2014 and in the past, managing the Eagle Eye Cloud VMS access was no exception.&nbsp;<\/p>\n\n\n\n<p>We are proud to announce that\u2019s no longer the case. By integrating both SCIM (which stands for \u201cSystem for Cross-domain Identity Management\u201d) and SSO (\u201cSingle Sign-on\u201d), Eagle Eye has made it simple for enterprise users to quickly onboard and offboard users and manage permissions as users&#8217; needs for VMS access evolve.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Solving complicated access issues for bigger clients\u00a0<\/h2>\n\n\n\n<p>Once you&#8217;re beyond a handful of users with need to access the system, you quickly run into time-intensive administration tasks just to assign and manage access privileges. Think of a large organization with hundreds or even thousands of employees, many of whom require access to the VMS based on their role, department, or location. And the VMS may be only one of several apps they&#8217;ll need access to. Managing and securing that access at scale is the problem that SCIM and SSO solve.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile is-image-fill-element een-text-media-block-left\" style=\"margin-bottom:var(--wp--preset--spacing--60);grid-template-columns:40% auto\"><figure class=\"wp-block-media-text__media\"><img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"450\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2025\/06\/scim-1.png\" alt=\"\" class=\"wp-image-191959 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2025\/06\/scim-1.png 600w, https:\/\/www.een.com\/wp-content\/uploads\/2025\/06\/scim-1-300x225.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Consider these common pain points that can make assigning the proper access difficult:<\/p>\n\n\n\n<ul class=\"wp-block-list standard-ul\">\n<li><strong>Manually adding new users<\/strong>, updating their roles, or removing access for departing employees.\u00a0<\/li>\n\n\n\n<li><strong>Juggling multiple passwords<\/strong> for various systems, including the VMS, increasing the likelihood of weak or reused passwords.<\/li>\n\n\n\n<li><strong>Tracking who has VMS access,<\/strong> both for operational purposes and in anticipation of internal or external audits.<\/li>\n\n\n\n<li><strong>Harmonizing VMS user accounts<\/strong> with other business system accounts, for a unified view of user privileges.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p>These challenges create inefficiencies \u2014&nbsp;and they also pose security risks. Unsecured or poorly secured access leaves you vulnerable to unauthorized access and data breaches.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Centrally manage authentication, authorization, and user provisioning<\/h2>\n\n\n\n<p>This is where SCIM and SSO step in to automate and secure VMS user management.<\/p>\n\n\n\n<p>SCIM (pronounced &#8221;skim&#8221;) is an open standard that defines how user identities are exchanged between identity providers (IdPs) like Okta and Microsoft Entra ID, and service providers, including cloud-based VMS vendors like Eagle Eye. Think of it as a universal language for identity data.<\/p>\n\n\n\n<p>For VMS administrators, SCIM enables:<\/p>\n\n\n\n<ul class=\"wp-block-list standard-ul\">\n<li><strong>Automated user provisioning:<\/strong> When a new employee who needs VMS access joins, SCIM can automatically create an account with the correct permissions.<\/li>\n\n\n\n<li><strong>Real-time updates:<\/strong> Changes to user roles, departments, or other attributes in your IdP are automatically synced, ensuring that user privileges are always up-to-date.<\/li>\n\n\n\n<li><strong>Automated deprovisioning:<\/strong> When an employee leaves, their VMS access can be revoked as part of the deprovisioning process in your IdP, mitigating the risk of inappropriate access.<\/li>\n\n\n\n<li><strong>Role management:<\/strong> SCIM can sync users by their designated roles, simplifying permissions management for large teams.<\/li>\n\n\n\n<li><strong>Location- or role-based camera access<\/strong>: Users can be granted access to cameras based on function (such as perimeter patrol) or geographic location (such as all cameras at a single site).\u00a0<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile is-image-fill-element een-text-media-block-right\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60);grid-template-columns:auto 35%\"><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\">The power of Single Sign-On for VMS<\/h2>\n\n\n\n<p>SSO allows users to access multiple applications with a single set of credentials and makes it easier to enable convenient multi-factor authentication (MFA). For VMS users, this means no more remembering separate passwords and fewer support requests due to lost passwords. Users can seamlessly log in to the VMS using their existing enterprise credentials, which provides an improved security posture and a better user experience. You can update credentials without needing to reissue passwords. (And of course, your VMS is just one system that your employees can get to easily through SSO.)<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"600\" height=\"450\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2025\/06\/scim-2.png\" alt=\"\" class=\"wp-image-191948 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2025\/06\/scim-2.png 600w, https:\/\/www.een.com\/wp-content\/uploads\/2025\/06\/scim-2-300x225.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure><\/div>\n\n\n\n<p>In addition, all login attempts are recorded by the IdP, providing a comprehensive audit trail for compliance and security investigations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Better together<\/h2>\n\n\n\n<p>Together, SCIM and SSO provide system administrators and IT departments a system for complete lifecycle management, from new hire to smooth offboarding, freeing up your team for more strategic initiatives.&nbsp;<\/p>\n\n\n\n<p>With real-time synchronization of user roles and attributes, you can easily enforce the principle of &#8221;least privilege,&#8221; ensuring users only have access to the VMS features and camera feeds necessary for their job functions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The practical upshot<\/h3>\n\n\n\n<p>The VMS is a critical component of your physical security system. By leveraging the power of SCIM for automated identity provisioning and SSO for streamlined, secure access, organizations can enhance the value of their system through improved user management. And since both SCIM and SSO are tools that scale, you can devote a smaller slice of IT department time to managing VMS access, no matter how many people need access.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Eagle Eye Cloud VMS Enterprise Edition integrates SCIM. Want to learn more?<\/strong> Just get in touch with your Eagle Eye representative.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#post-contact-form\">Let&#8217;s talk<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Managing user access to business systems has long been a frustrating, time-consuming, and error-prone process for any large organization \u2014 and in the past, managing the Eagle Eye Cloud VMS &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/sv\/blog\/scim-and-cloud-vms\/\"> <span class=\"screen-reader-text\">Save time and simplify VMS access with SCIM and SSO.<\/span> L\u00e4s mer &raquo;<\/a><\/p>\n","protected":false},"author":3197,"featured_media":191970,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"4139,4147,4823,4827,4829,4831","_relevanssi_noindex_reason":"","footnotes":""},"categories":[2126],"tags":[],"class_list":["post-191947","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/191947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/users\/3197"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/comments?post=191947"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/191947\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media\/191970"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media?parent=191947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/categories?post=191947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/tags?post=191947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}