Integration architecture

For FreeIPA deployments, FreeSCIM should consume identity events as eventual source-of-truth updates, not as a second control plane. The expected pattern is:

  1. Read LDAP/IPA attributes through a bounded trust path.
  2. Normalize identity fields to SCIM canonical types in a deterministic mapper.
  3. Emit user and group lifecycle events with idempotency keys.
  4. Persist audit events for every connector write and reconcile response.

Attribute contract and mapping risk

The most common integration failure is inconsistent attribute projection between directory schema and SCIM extension fields.

Trust and hardening controls

FreeIPA Directory --(TLS + service principal)--> SCIM Auth Gateway --(idempotent payload)--> User/Group Writer --(audit)--> Event Store
Treat connector authentication, TLS policy, and audit sink as mandatory controls before high-impact writes.

Operational caveat

Do not mirror FreeIPA administrative groups into FreeSCIM managed groups unless there is an explicit change control owner. Directory-provisioned entitlement changes should follow approval steps and include rollback checkpoints.

Deployment and validation checklist

FreeIPA mapping edge checks