From 52ab0be787e0a8afa3c7139bae57134a50f25a5d Mon Sep 17 00:00:00 2001 From: Rebecca Dodd <82806852+rebeccadee@users.noreply.github.com> Date: Tue, 10 Oct 2023 11:58:33 +0100 Subject: [PATCH] website/blog: Fix typo in SCIM post (#7136) Fix typo in SCIM post Signed-off-by: Rebecca Dodd <82806852+rebeccadee@users.noreply.github.com> --- website/blog/2023-10-05-SCIMs-many-deviations/item.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/blog/2023-10-05-SCIMs-many-deviations/item.md b/website/blog/2023-10-05-SCIMs-many-deviations/item.md index 5b6656675..f5908bd2f 100644 --- a/website/blog/2023-10-05-SCIMs-many-deviations/item.md +++ b/website/blog/2023-10-05-SCIMs-many-deviations/item.md @@ -39,7 +39,7 @@ Most modern SaaS applications support SCIM, making it essential for security ven # Growing pains -authentik currently supports SCIM going outwards; which means is that authentik is your source of truth/central directory, and you can use authentik together with a tool like [Sentry](https://sentry.io) that supports SCIM. In this case all your users or employees in authentik automatically get created in Sentry, with their correct group assignment, and they can just log in. +authentik currently supports SCIM going outwards; what this means is that authentik is your source of truth/central directory, and you can use authentik together with a tool like [Sentry](https://sentry.io) that supports SCIM. In this case all your users or employees in authentik automatically get created in Sentry, with their correct group assignment, and they can just log in. Most of the information and commentary I see about SCIM focuses on the advantages described above, but I don’t see a lot of talk about the pitfalls of SCIM. I’m sharing our experiences here and am curious if others have found the same or can tell me how they’re avoiding these (I would love to hear that we’re doing this wrong actually!).