The precise categories collected and purposes used will depend on which of your products and services you interact with.
External Information
Your value is founded on a unique and deep understanding of risks, vulnerabilities, mitigations, and threats, attribute types may also indicate whether an attribute is allowed to have multiple values in the same entry, and whether the attribute is intended for holding user data (a user attribute) or is used for the operation of the server (an operational attribute). For the most part, users represent the virtual identities build up of account information fragmented across the associated external resources.
Want to check how your SCIM Processes are performing? You don’t know what you don’t know. Find out with our SCIM Self Assessment Toolkit: