Internet Engineering Task Force S. Kushwaha Internet-Draft Oracle Corporation Intended status: Standards Track 29 April 2026 Expires: 31 October 2026 SCIM DID/VC Binding Extension draft-kushwaha-scim-didvc-binding-00 Abstract This document defines an extension to the System for Cross-domain Identity Management (SCIM) for binding SCIM User resources to decentralized identity artifacts, including Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs). The extension introduces a read-only SCIM schema extension for User resources that exposes binding state for discovery, a new SCIM resource type named IdentityBinding that records auditable linkage between a SCIM user and one or more DIDs and credential references, and an optional SCIM schema extension for ServiceProviderConfig that advertises server capabilities for DID and VC binding. This specification intentionally does not define DID resolution, credential issuance, credential transport, or authentication flows. Instead, it defines how a SCIM service provider represents, discovers, queries, and manages binding state derived from those systems. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 31 October 2026. Kushwaha Expires 31 October 2026 [Page 1] Internet-Draft SCIM DID/VC Binding April 2026 Copyright Notice Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3 1.2. Scope . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3. Problem Statement . . . . . . . . . . . . . . . . . . . . 4 1.4. Design Goals . . . . . . . . . . . . . . . . . . . . . . 4 2. Architecture Overview . . . . . . . . . . . . . . . . . . . . 5 3. Data Model . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.1. User Extension Schema . . . . . . . . . . . . . . . . . . 5 3.1.1. Derivation of primaryDid . . . . . . . . . . . . . . 7 3.2. IdentityBinding Resource . . . . . . . . . . . . . . . . 8 3.3. Relationship Between correlationModel and dids.relationship . . . . . . . . . . . . . . . . . . . . 13 3.4. ServiceProviderConfig Extension . . . . . . . . . . . . . 14 4. Processing Model . . . . . . . . . . . . . . . . . . . . . . 15 4.1. Creation . . . . . . . . . . . . . . . . . . . . . . . . 15 4.2. Validation . . . . . . . . . . . . . . . . . . . . . . . 16 4.3. State Transitions . . . . . . . . . . . . . . . . . . . . 16 4.3.1. Re-evaluation of Rejected Bindings . . . . . . . . . 18 4.4. Deletion . . . . . . . . . . . . . . . . . . . . . . . . 18 5. Query, Filtering, PATCH, and Pagination . . . . . . . . . . . 18 5.1. Filtering . . . . . . . . . . . . . . . . . . . . . . . . 18 5.2. PATCH . . . . . . . . . . . . . . . . . . . . . . . . . . 20 5.3. Pagination . . . . . . . . . . . . . . . . . . . . . . . 21 6. Error Handling . . . . . . . . . . . . . . . . . . . . . . . 21 7. Discovery and Deployment . . . . . . . . . . . . . . . . . . 22 8. Security Considerations . . . . . . . . . . . . . . . . . . . 23 8.1. Threat Model . . . . . . . . . . . . . . . . . . . . . . 23 8.2. Required Mitigations . . . . . . . . . . . . . . . . . . 23 8.3. DID Control Proof Delivery . . . . . . . . . . . . . . . 23 8.4. Replay Attack Mitigation . . . . . . . . . . . . . . . . 24 8.5. Delegated Verifier Trust Scope . . . . . . . . . . . . . 24 9. Privacy Considerations . . . . . . . . . . . . . . . . . . . 24 Kushwaha Expires 31 October 2026 [Page 2] Internet-Draft SCIM DID/VC Binding April 2026 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 25 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 25 11.1. Normative References . . . . . . . . . . . . . . . . . . 25 11.2. Informative References . . . . . . . . . . . . . . . . . 26 Appendix A. SCIM Schema URI Registration Templates . . . . . . . 26 A.1. User Extension . . . . . . . . . . . . . . . . . . . . . 26 A.2. IdentityBinding . . . . . . . . . . . . . . . . . . . . . 26 A.3. ServiceProviderConfig Extension . . . . . . . . . . . . . 27 Appendix B. Examples . . . . . . . . . . . . . . . . . . . . . . 27 B.1. Example User Representation . . . . . . . . . . . . . . . 27 B.2. Example IdentityBinding Representation . . . . . . . . . 28 B.3. Example ServiceProviderConfig Representation . . . . . . 30 Appendix C. Discovery Examples . . . . . . . . . . . . . . . . . 30 C.1. Example /ResourceTypes Entry for IdentityBinding . . . . 30 C.2. Example /Schemas Entry for the User Extension . . . . . . 31 Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 32 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 32 1. Introduction SCIM provides a standard protocol and schema model for provisioning and managing identities across administrative domains [RFC7643] [RFC7644]. SCIM supports new resource types and schema extensions, publishes schema metadata through Schema resources, publishes resource metadata through ResourceType resources, and provides service capability discovery through ServiceProviderConfig [RFC7643]. DID Core defines DID documents, verification methods, and proof- purpose relationships, while the Verifiable Credentials Data Model defines issuer, holder, verifier, status, schema, and validation concepts for verifiable credentials [DID-CORE] [VC-DATA-MODEL-2.0]. In many deployments, SCIM is the system of record for account lifecycle, while DID and VC systems are the system of record for decentralized identifiers and cryptographic trust. Today that linkage is usually proprietary: implementers invent local attributes, cannot query consistently, and cannot express lifecycle events such as DID deactivation, key rotation, or VC revocation in an interoperable SCIM form. This specification fills that gap by standardizing binding state, not by embedding full DID documents or full VC payloads. 1.1. Requirements Language The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, NOT RECOMMENDED, MAY, and OPTIONAL in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. Kushwaha Expires 31 October 2026 [Page 3] Internet-Draft SCIM DID/VC Binding April 2026 SCIM resource representations in this document are encoded in JSON [RFC8259] as required by [RFC7643]. 1.2. Scope This specification applies to SCIM User resources only. This specification defines schema and resource representations, discovery behavior, filtering, pagination, and PATCH expectations for binding resources, and lifecycle and privacy semantics for DID and VC bindings. This specification does not define DID method semantics, DID resolution protocols, VC issuance or presentation protocols, proof formats, wallet protocols, or authentication and federation replacement. 1.3. Problem Statement A provisioning client frequently needs to answer questions such as: * Which SCIM user is bound to this DID? * Which users have an active workforce or employment credential from a trusted issuer? * What is the effect of credential revocation on the provisioned account? * Can the service provider support pairwise DIDs, credential status checking, and external verifier delegation? Base SCIM does not answer those questions in an interoperable way. 1.4. Design Goals This specification has four goals: 1. preserve SCIM as the provisioning and lifecycle layer; 2. preserve DID and VC systems as the cryptographic trust layer; 3. minimize correlation and over-disclosure; and 4. define a small interoperable subset that clients and servers can implement consistently. Kushwaha Expires 31 October 2026 [Page 4] Internet-Draft SCIM DID/VC Binding April 2026 2. Architecture Overview This specification uses a dual-layer model: * A read-only User extension provides lightweight discoverability. * A mutable IdentityBinding resource carries binding state, DID references, credential references, and lifecycle state. A SCIM service provider MAY validate DID and VC evidence itself or MAY delegate validation to an external verification service. If validation is delegated, the wire protocol between the SCIM service provider and the verifier is out of scope. The SCIM service provider remains responsible for exposing standards-conformant SCIM resources and state transitions. A service provider conforming to this specification MUST NOT persist full DID documents in SCIM resources and MUST NOT persist full VC payloads in SCIM resources. A service provider SHOULD store only references, identifiers, validation timestamps, and normalized outcomes. 3. Data Model This specification defines three distinct status vocabularies: per- DID status reflects DID document state (such as whether a DID has been verified or deactivated), per-credential status reflects verifiable credential lifecycle state (such as validity-period or revocation outcomes), and binding-level status reflects the composite lifecycle of the IdentityBinding resource itself. These vocabularies are intentionally not unified. The aggregate User.bindingState additionally defines the value none to indicate a user with no bindings (see Section 3.1), which does not appear in any resource- level status. 3.1. User Extension Schema The schema URI for the User extension defined by this specification is urn:ietf:params:scim:schemas:extension:didvc:2.0:User. This extension is a derived, read-only projection of the user's decentralized identity binding state. Clients do not create bindings by writing this extension; they create or modify IdentityBinding resources. Kushwaha Expires 31 October 2026 [Page 5] Internet-Draft SCIM DID/VC Binding April 2026 +============+=======+===+===+==========+==========+===============+ |Attribute |Type |MV |Req|Mutability|Values |Description | +============+=======+===+===+==========+==========+===============+ |primaryDid |string |no |no |readOnly |- |The verified | | | | | | | |primary DID | | | | | | | |currently | | | | | | | |associated with| | | | | | | |the user, if | | | | | | | |any. Derived | | | | | | | |from the active| | | | | | | |primary | | | | | | | |IdentityBinding| | | | | | | |per the | | | | | | | |algorithm in | | | | | | | |Section 3.1.1. | +------------+-------+---+---+----------+----------+---------------+ |bindingState|string |no |yes|readOnly |none, |Aggregate state| | | | | | |pending, |derived from | | | | | | |active, |active bindings| | | | | | |suspended,|for the user. | | | | | | |revoked, |The value none | | | | | | |rejected |indicates the | | | | | | | |user has no | | | | | | | |associated | | | | | | | |IdentityBinding| | | | | | | |resources and | | | | | | | |does not appear| | | | | | | |in binding- | | | | | | | |level status | | | | | | | |vocabularies. | +------------+-------+---+---+----------+----------+---------------+ |bindingRefs |complex|yes|no |readOnly |- |References to | | | | | | | |IdentityBinding| | | | | | | |resources | | | | | | | |associated with| | | | | | | |the user. | +------------+-------+---+---+----------+----------+---------------+ Table 1: User Extension Attributes Kushwaha Expires 31 October 2026 [Page 6] Internet-Draft SCIM DID/VC Binding April 2026 +=============+=========+===+==========+==========+=================+ |Sub-Attribute|Type |Req|Mutability|Values | Description | +=============+=========+===+==========+==========+=================+ |value |string |yes|readOnly |- | The SCIM id of | | | | | | | the | | | | | | | IdentityBinding | | | | | | | resource. | +-------------+---------+---+----------+----------+-----------------+ |$ref |reference|yes|readOnly |- | URI of the | | | | | | | IdentityBinding | | | | | | | resource. | +-------------+---------+---+----------+----------+-----------------+ |display |string |no |readOnly |- | Human-readable | | | | | | | label for the | | | | | | | binding. | +-------------+---------+---+----------+----------+-----------------+ |primary |boolean |no |readOnly |- | Indicates | | | | | | | whether this | | | | | | | binding is the | | | | | | | source of | | | | | | | primaryDid. | +-------------+---------+---+----------+----------+-----------------+ |status |string |yes|readOnly |pending, | Current | | | | | |active, | lifecycle state | | | | | |suspended,| of the | | | | | |revoked, | referenced | | | | | |rejected | binding. | +-------------+---------+---+----------+----------+-----------------+ Table 2: bindingRefs Sub-Attributes A conforming server MUST derive primaryDid, bindingState, and bindingRefs from IdentityBinding resources, MUST NOT allow clients to directly mutate this extension, MUST omit primaryDid when no verified primary DID exists, and MUST ensure that at most one bindingRefs entry has primary=true. 3.1.1. Derivation of primaryDid A server MUST derive User.primaryDid using the following algorithm: 1. Collect all IdentityBinding resources whose user.value matches the target user and whose binding-level status is active. 2. From that set, select the binding for which bindingRefs.primary=true is set in the User extension projection. At most one such binding is permitted. Kushwaha Expires 31 October 2026 [Page 7] Internet-Draft SCIM DID/VC Binding April 2026 3. Within that binding, select the dids entry with primary=true and status=verified. 4. Set User.primaryDid to the value of that DID entry. If no such entry exists, omit User.primaryDid. A server MUST NOT set User.primaryDid from a binding that is not in active status, and MUST clear User.primaryDid when the binding that sourced it transitions out of active status or is deleted. If multiple active bindings each contain a DID entry with primary=true, the server MUST reject creation or PATCH operations that would produce this ambiguous state with HTTP 400 and a SCIM error type of invalidValue. 3.2. IdentityBinding Resource The IdentityBinding resource type uses the endpoint /IdentityBindings and the schema URI urn:ietf:params:scim:schemas:extension:didvc:2.0:IdentityBinding. An IdentityBinding resource represents the auditable linkage between one SCIM User resource and one or more DIDs, together with optional references to credentials whose validation influences the state of the binding. All IdentityBinding resources include the standard SCIM common attributes defined in Section 3.1 of [RFC7643], including id, externalId, and meta. The meta.lastModified timestamp records the time of the most recent update to the resource representation. The lastValidationAttempt attribute defined in this specification is distinct from meta.lastModified: it records when a validation cycle was last run against the DID and credential evidence, which may differ from when the resource itself was last written. +=====================+========+===+===+==========+==========+==================+ |Attribute |Type |MV |Req|Mutability|Values |Description | +=====================+========+===+===+==========+==========+==================+ |user |complex |no |yes|immutable |- |Reference to the | | | | | | | |bound SCIM User. | +---------------------+--------+---+---+----------+----------+------------------+ |correlationModel |string |no |yes|immutable |pairwise, |Privacy | | | | | | |shared, |expectation for | | | | | | |public |DID reuse across | | | | | | | |relying parties. | | | | | | | |See Section 3.3 | | | | | | | |for the | | | | | | | |relationship | Kushwaha Expires 31 October 2026 [Page 8] Internet-Draft SCIM DID/VC Binding April 2026 | | | | | | |between this field| | | | | | | |and per-DID | | | | | | | |relationship | | | | | | | |values. | +---------------------+--------+---+---+----------+----------+------------------+ |dids |complex |yes|yes|readWrite |- |DIDs associated | | | | | | | |with the binding. | +---------------------+--------+---+---+----------+----------+------------------+ |credentials |complex |yes|no |readWrite |- |Credential | | | | | | | |references | | | | | | | |associated with | | | | | | | |the binding. | +---------------------+--------+---+---+----------+----------+------------------+ |status |string |no |yes|readOnly |pending, |Binding lifecycle | | | | | | |active, |state. | | | | | | |suspended,| | | | | | | |revoked, | | | | | | | |rejected | | +---------------------+--------+---+---+----------+----------+------------------+ |lastValidationAttempt|dateTime|no |no |readOnly |- |Timestamp of the | | | | | | | |most recent | | | | | | | |validation | | | | | | | |attempt, | | | | | | | |regardless of | | | | | | | |outcome. Updated | | | | | | | |on both successful| | | | | | | |and failed | | | | | | | |validation runs. | | | | | | | |Distinct from | | | | | | | |meta.lastModified,| | | | | | | |which reflects | | | | | | | |resource write | | | | | | | |time. | +---------------------+--------+---+---+----------+----------+------------------+ |statusReason |string |no |no |readOnly |- |Human-readable | | | | | | | |explanation for | | | | | | | |the current | | | | | | | |status. | +---------------------+--------+---+---+----------+----------+------------------+ Table 3: IdentityBinding Attributes Kushwaha Expires 31 October 2026 [Page 9] Internet-Draft SCIM DID/VC Binding April 2026 +===============+===========+=====+============+=================+ | Sub-Attribute | Type | Req | Mutability | Description | +===============+===========+=====+============+=================+ | value | string | yes | immutable | The SCIM id of | | | | | | the bound User. | +---------------+-----------+-----+------------+-----------------+ | $ref | reference | yes | immutable | URI of the | | | | | | bound User. | +---------------+-----------+-----+------------+-----------------+ | display | string | no | readOnly | Human-readable | | | | | | display name | | | | | | for the user. | +---------------+-----------+-----+------------+-----------------+ Table 4: user Sub-Attributes +==================+=======+===+==========+===============+=================+ |Sub-Attribute |Type |Req|Mutability|Values |Description | +==================+=======+===+==========+===============+=================+ |value |string |yes|readWrite |- |DID URI. | +------------------+-------+---+----------+---------------+-----------------+ |relationship |string |yes|readWrite |primary, |Role of the DID | | | | | |pairwise, |in the binding. | | | | | |delegated, |See Section 3.3 | | | | | |recovery |for the | | | | | | |distinction | | | | | | |between this | | | | | | |field and the | | | | | | |binding-level | | | | | | |correlationModel.| | | | | | |The value | | | | | | |recovery | | | | | | |designates a DID | | | | | | |that is | | | | | | |authorized to | | | | | | |execute key | | | | | | |recovery | | | | | | |operations for | | | | | | |the primary DID | | | | | | |of the binding, | | | | | | |as defined by the| | | | | | |applicable DID | | | | | | |method; its | | | | | | |presence does not| | | | | | |affect binding- | | | | | | |level status | | | | | | |derivation. | +------------------+-------+---+----------+---------------+-----------------+ Kushwaha Expires 31 October 2026 [Page 10] Internet-Draft SCIM DID/VC Binding April 2026 |verificationMethod|string |no |readWrite |- |DID URL of the | | | | | | |verification | | | | | | |method used for | | | | | | |proof evaluation.| +------------------+-------+---+----------+---------------+-----------------+ |proofPurpose |string |no |readWrite |authentication,|DID proof purpose| | | | | |assertionMethod|expected for | | | | | | |verification. | +------------------+-------+---+----------+---------------+-----------------+ |controller |string |no |readWrite |- |DID controller | | | | | | |identifier when | | | | | | |known. | +------------------+-------+---+----------+---------------+-----------------+ |primary |boolean|no |readWrite |- |Indicates the | | | | | | |preferred DID for| | | | | | |the binding. | +------------------+-------+---+----------+---------------+-----------------+ |status |string |yes|readOnly |pending, |Per-DID | | | | | |verified, |validation | | | | | |deactivated |status. The | | | | | | |value deactivated| | | | | | |aligns with the | | | | | | |DID Core | | | | | | |specification's | | | | | | |terminal state | | | | | | |for a DID | | | | | | |document | | | | | | |[DID-CORE]. | +------------------+-------+---+----------+---------------+-----------------+ Table 5: dids Sub-Attributes +===================+=========+===+==========+========+============+ |Sub-Attribute |Type |Req|Mutability|Values |Description | +===================+=========+===+==========+========+============+ |credentialId |string |no |readWrite |- |Identifier | | | | | | |of the VC, | | | | | | |if present. | +-------------------+---------+---+----------+--------+------------+ |types |string |yes|readWrite |- |VC type | | | | | | |values | | | | | | |relevant to | | | | | | |the binding.| | | | | | |Multi- | | | | | | |valued. | +-------------------+---------+---+----------+--------+------------+ |issuer |string |yes|readWrite |- |Issuer | | | | | | |identifier, | Kushwaha Expires 31 October 2026 [Page 11] Internet-Draft SCIM DID/VC Binding April 2026 | | | | | |commonly a | | | | | | |DID or URI. | +-------------------+---------+---+----------+--------+------------+ |holder |string |no |readWrite |- |Holder | | | | | | |identifier, | | | | | | |if expressed| | | | | | |by the | | | | | | |ecosystem. | | | | | | |Implementers| | | | | | |SHOULD omit | | | | | | |this field | | | | | | |unless | | | | | | |explicitly | | | | | | |required, as| | | | | | |holder DIDs | | | | | | |can create | | | | | | |correlation | | | | | | |risk (see | | | | | | |Section 9). | +-------------------+---------+---+----------+--------+------------+ |credentialSubjectId|string |no |readWrite |- |Credential | | | | | | |subject | | | | | | |identifier, | | | | | | |if | | | | | | |available. | | | | | | |Implementers| | | | | | |SHOULD omit | | | | | | |this field | | | | | | |unless | | | | | | |explicitly | | | | | | |required, as| | | | | | |subject DIDs| | | | | | |can create | | | | | | |correlation | | | | | | |risk (see | | | | | | |Section 9). | +-------------------+---------+---+----------+--------+------------+ |statusRef |reference|no |readWrite |- |Reference to| | | | | | |credential | | | | | | |status | | | | | | |information.| +-------------------+---------+---+----------+--------+------------+ |schemaRef |reference|no |readWrite |- |Reference to| | | | | | |credential | | | | | | |schema | | | | | | |information.| +-------------------+---------+---+----------+--------+------------+ |validFrom |dateTime |no |readWrite |- |Start of | Kushwaha Expires 31 October 2026 [Page 12] Internet-Draft SCIM DID/VC Binding April 2026 | | | | | |credential | | | | | | |validity, if| | | | | | |known. | +-------------------+---------+---+----------+--------+------------+ |validUntil |dateTime |no |readWrite |- |End of | | | | | | |credential | | | | | | |validity, if| | | | | | |known. | +-------------------+---------+---+----------+--------+------------+ |status |string |yes|readOnly |pending,|Server- | | | | | |active, |normalized | | | | | |revoked,|outcome for | | | | | |expired,|the | | | | | |unknown |credential | | | | | | |reference. | +-------------------+---------+---+----------+--------+------------+ Table 6: credentials Sub-Attributes A conforming server MUST require at least one dids entry in every IdentityBinding, MUST permit at most one dids entry with primary=true, MUST require relationship=primary on any DID entry with primary=true, and MUST set status=pending on creation unless the server can validate synchronously before returning the resource. A conforming server MUST NOT set status=active unless at least one DID entry has status=verified. The server MUST update User.primaryDid when the binding becomes active or inactive per the algorithm in Section 3.1.1, and MUST reject creation of more than one active IdentityBinding containing the same DID value within a single administrative scope (the SCIM service provider, or in multi-tenant deployments, a single tenant) when the binding's correlationModel is pairwise, regardless of which User is referenced. 3.3. Relationship Between correlationModel and dids.relationship The correlationModel attribute on an IdentityBinding and the relationship sub-attribute on individual DID entries operate at different levels of abstraction and are not redundant. correlationModel is a binding-level declaration of the privacy expectation for DID reuse across relying parties. A value of pairwise means the DIDs in this binding are intended for use only with this relying party and MUST NOT be reused at other services. A value of shared means the DIDs may be shared across a defined set of relying parties. A value of public means the DIDs are publicly shareable without restriction. Kushwaha Expires 31 October 2026 [Page 13] Internet-Draft SCIM DID/VC Binding April 2026 dids.relationship describes the functional role of a specific DID within the binding (e.g., primary for the main authentication DID, delegated for a capability-delegation DID, recovery for a key- recovery DID). A binding with correlationModel=pairwise may contain multiple DID entries with different relationship values; the correlation model applies to all of them collectively. The combination correlationModel=shared with relationship=pairwise on an individual DID entry is permitted when one DID in the binding is used only pairwise while others in the same binding are shared. 3.4. ServiceProviderConfig Extension The schema URI for the ServiceProviderConfig extension defined by this specification is urn:ietf:params:scim:schemas:extension:didvc:2.0:ServiceProviderConfig. This extension advertises the server's DID and VC binding capabilities without modifying the core ServiceProviderConfig schema. +==========================+=======+===+===+==========+=============+===============+ |Attribute |Type |MV |Req|Mutability|Values |Description | +==========================+=======+===+===+==========+=============+===============+ |enabled |boolean|no |yes|readOnly |- |Indicates | | | | | | | |whether DID/VC | | | | | | | |binding is | | | | | | | |currently | | | | | | | |enabled for new| | | | | | | |IdentityBinding| | | | | | | |creation. A | | | | | | | |server MAY | | | | | | | |deploy the | | | | | | | |extension | | | | | | | |schema while | | | | | | | |setting this to| | | | | | | |false to | | | | | | | |indicate | | | | | | | |temporary | | | | | | | |suspension of | | | | | | | |new binding | | | | | | | |intake. | +--------------------------+-------+---+---+----------+-------------+---------------+ |verificationDelegation |string |no |yes|readOnly |internal, |Whether | | | | | | |external, |verification is| | | | | | |mixed |performed by | | | | | | | |the SCIM server| | | | | | | |(internal), an | | | | | | | |external | Kushwaha Expires 31 October 2026 [Page 14] Internet-Draft SCIM DID/VC Binding April 2026 | | | | | | |verifier | | | | | | | |(external), or | | | | | | | |both depending | | | | | | | |on DID method | | | | | | | |or credential | | | | | | | |type (mixed). | | | | | | | |When mixed, | | | | | | | |clients SHOULD | | | | | | | |NOT assume a | | | | | | | |specific | | | | | | | |verification | | | | | | | |path for any | | | | | | | |given DID | | | | | | | |method or | | | | | | | |credential type| | | | | | | |without out-of-| | | | | | | |band knowledge.| +--------------------------+-------+---+---+----------+-------------+---------------+ |supportedDidMethods |string |yes|no |readOnly |- |DID methods | | | | | | | |accepted by the| | | | | | | |service | | | | | | | |provider. | +--------------------------+-------+---+---+----------+-------------+---------------+ |supportedCredentialChecks |string |yes|no |readOnly |status, |VC checks the | | | | | | |schema, |server is | | | | | | |validity, |capable of | | | | | | |holderBinding|evaluating. | +--------------------------+-------+---+---+----------+-------------+---------------+ |supportedCorrelationModels|string |yes|yes|readOnly |pairwise, |Correlation | | | | | | |shared, |models | | | | | | |public |supported by | | | | | | | |the server. | +--------------------------+-------+---+---+----------+-------------+---------------+ Table 7: ServiceProviderConfig Extension Attributes 4. Processing Model 4.1. Creation A client creates a User resource using normal SCIM semantics. A client creates an IdentityBinding by POSTing to /IdentityBindings. The client MUST provide user, correlationModel, and at least one dids entry. The client MAY include credentials. The server MUST verify that user.value references an existing User resource and MUST return HTTP 400 with SCIM error type invalidValue if the reference cannot be resolved. Kushwaha Expires 31 October 2026 [Page 15] Internet-Draft SCIM DID/VC Binding April 2026 Upon creation, the server MUST create the resource in pending status unless synchronous validation has already completed successfully, MUST record normalized validation results in per-DID and per- credential status fields, and MUST update the derived User extension when binding state changes. The server MUST return HTTP 201 with a Location header pointing to the created resource. 4.2. Validation This specification requires that DID control be verified before a binding may become active. How a client presents DID control evidence to the SCIM server (e.g., via a challenge-response protocol, a Verifiable Presentation submitted in a related flow, or a proof in a request header) is out of scope for this specification. Implementations SHOULD consult relevant specifications such as OpenID for Verifiable Presentations or DIF Presentation Exchange for proof transport mechanisms that can be integrated with SCIM deployment. To validate DID control, the server or delegated verifier MUST resolve the DID and verify that the verification method used for proof checking is authorized for the appropriate proof-purpose relationship in the DID document [DID-CORE]. The server MUST re- resolve DID documents when revalidating a binding, and MUST NOT rely on cached DID resolution results whose age exceeds the server's configured revalidation window. To validate a credential reference, the server or delegated verifier MUST, where applicable, verify cryptographic integrity, evaluate issuer and controller consistency, evaluate validFrom and validUntil, evaluate credential status when status information is available, and evaluate credential schema when schema information is available [VC-DATA-MODEL-2.0]. This specification does not define proof formats or verifier APIs. 4.3. State Transitions The server MUST implement the following binding-state semantics: Kushwaha Expires 31 October 2026 [Page 16] Internet-Draft SCIM DID/VC Binding April 2026 +===========+===========+======================================+ | From | To | Condition | +===========+===========+======================================+ | pending | active | Required DID proof and all required | | | | credential checks succeed. | +-----------+-----------+--------------------------------------+ | pending | suspended | Validation attempt is temporarily | | | | inconclusive before the binding has | | | | ever been active (e.g., DID resolver | | | | unavailable at creation time). | +-----------+-----------+--------------------------------------+ | pending | rejected | Validation fails conclusively before | | | | the binding has ever been active. | +-----------+-----------+--------------------------------------+ | active | suspended | Revalidation is temporarily | | | | inconclusive, such as unavailable | | | | resolver or unknown credential | | | | status. | +-----------+-----------+--------------------------------------+ | active | revoked | DID deactivation, credential | | | | revocation, or policy failure is | | | | confirmed. | +-----------+-----------+--------------------------------------+ | suspended | active | Revalidation succeeds. | +-----------+-----------+--------------------------------------+ | suspended | revoked | Negative status is later confirmed. | +-----------+-----------+--------------------------------------+ | rejected | pending | Client corrects DID evidence via | | | | PATCH and requests re-evaluation | | | | (see Section 4.3.1). | +-----------+-----------+--------------------------------------+ Table 8: Binding State Transitions Once a binding has transitioned to active, subsequent conclusive validation failure results in transition to revoked, not rejected. The rejected state applies only to bindings that never achieved active status. The revoked state is terminal. To re-establish trust after a binding reaches the revoked state, a client MUST create a new IdentityBinding resource; a server MUST NOT transition a revoked binding back to pending, active, or suspended. A server MUST NOT treat unknown or missing validation results as equivalent to active. Kushwaha Expires 31 October 2026 [Page 17] Internet-Draft SCIM DID/VC Binding April 2026 4.3.1. Re-evaluation of Rejected Bindings A client MAY request re-evaluation of a binding in the rejected state by submitting a SCIM PATCH request that replaces or updates one or more dids entries (for example, correcting an invalid verificationMethod, replacing an unresolvable DID value, or adding a new DID entry). Upon receiving such a PATCH, the server MUST transition the binding to pending status and MUST initiate a new validation cycle. The server MUST NOT require the client to delete and recreate the resource solely to trigger re-evaluation after a correctable rejection. 4.4. Deletion A service provider implementing this specification MUST support DELETE for IdentityBinding resources. Upon successful deletion of an IdentityBinding resource, the server MUST remove the corresponding entry from the associated User's bindingRefs and MUST clear User.primaryDid if the deleted binding was the source of that value. The server MUST recalculate User.bindingState after deletion. A server MAY reject deletion of a binding in active status and require the client to first transition it to a non-active state via PATCH. If such a restriction is imposed, the server MUST document this behavior in its ServiceProviderConfig or deployment documentation. A server MUST return HTTP 204 on successful deletion. 5. Query, Filtering, PATCH, and Pagination 5.1. Filtering SCIM filter expressions and fully qualified attribute notation are defined by [RFC7644]. Filter attribute values in request URIs MUST be percent-encoded as required by RFC 3986; the examples in this section show decoded values for readability. A service provider implementing this specification MUST support GET filtering on /IdentityBindings using the eq operator for the following attributes: * user.value * dids.value Kushwaha Expires 31 October 2026 [Page 18] Internet-Draft SCIM DID/VC Binding April 2026 * dids.relationship * credentials.issuer * credentials.types * status * externalId (a common attribute defined in Section 3.1 of [RFC7643] and inherited by all SCIM resource types) A service provider implementing this specification MUST additionally support the co (contains) and pr (present) operators for the multi- valued string attributes credentials.types and dids.value. This allows clients to filter by partial VC type values (e.g., credentials.types co "EmploymentCredential") and to find resources that have at least one credential or DID present. A service provider implementing the User extension MUST support eq filtering on urn:ietf:params:scim:schemas:extension:didvc:2.0:User:primaryDid. A service provider implementing this specification MUST support the and logical operator in combination with the attributes above. Support for the or and not operators is OPTIONAL. GET /IdentityBindings?filter=dids.value eq "did:example:123" Figure 1: Example Filter by DID (values shown decoded; apply percent-encoding in actual requests) GET /IdentityBindings?filter=status eq "active" and credentials.issuer eq "did:example:issuer:acme" Figure 2: Example Combined Filter GET /IdentityBindings?filter=credentials.types co "EmploymentCredential" Figure 3: Example Filter Using co Operator on Multi-valued types GET /Users?filter=urn:ietf:params:scim:schemas:extension:didvc:2.0:User:primaryDid eq "did:example:123" Figure 4: Example User Filter by primaryDid Kushwaha Expires 31 October 2026 [Page 19] Internet-Draft SCIM DID/VC Binding April 2026 5.2. PATCH A service provider implementing IdentityBinding MUST support SCIM PATCH as defined by [RFC7644]. PATCH request bodies MUST conform to the PatchOp message format defined in Section 3.5.2 of [RFC7644], which requires the schemas member and an Operations array wrapping all individual operation objects. Clients SHOULD target explicit paths. A server MUST return HTTP 400 with a SCIM error type of mutability when a PATCH attempts to modify an attribute declared as immutable (such as user or correlationModel) or readOnly (such as status or lastValidationAttempt). { "schemas": ["urn:ietf:params:scim:api:messages:2.0:PatchOp"], "Operations": [ { "op": "replace", "path": "dids[value eq \"did:example:123\"].primary", "value": true } ] } Figure 5: Example PATCH to Set a Primary DID Flag { "schemas": ["urn:ietf:params:scim:api:messages:2.0:PatchOp"], "Operations": [ { "op": "replace", "path": "credentials[issuer eq \"did:example:issuer:acme\"].schemaRef", "value": "https://issuer.example/schemas/employment-v1" } ] } Figure 6: Example PATCH to Update a Credential Schema Reference Kushwaha Expires 31 October 2026 [Page 20] Internet-Draft SCIM DID/VC Binding April 2026 { "schemas": ["urn:ietf:params:scim:api:messages:2.0:PatchOp"], "Operations": [ { "op": "replace", "path": "dids[value eq \"did:example:old\"].verificationMethod", "value": "did:example:abc123#key-2" } ] } Figure 7: Example PATCH to Correct a DID and Trigger Re- evaluation of a Rejected Binding 5.3. Pagination List operations for IdentityBinding resources MUST support SCIM list pagination as defined by [RFC7644]. A service provider MAY additionally support cursor-based pagination as defined by [RFC9865]. 6. Error Handling A conforming server MUST return SCIM error responses as defined in Section 3.12 of [RFC7644] for all error conditions. The following table enumerates error conditions specific to this specification. Kushwaha Expires 31 October 2026 [Page 21] Internet-Draft SCIM DID/VC Binding April 2026 +====================================+========+==============+ | Condition | HTTP | SCIM | | | Status | scimType | +====================================+========+==============+ | user.value references a non- | 400 | invalidValue | | existent User | | | +------------------------------------+--------+--------------+ | Request includes more than one | 400 | invalidValue | | dids entry with primary=true | | | +------------------------------------+--------+--------------+ | A dids entry has primary=true but | 400 | invalidValue | | relationship is not primary | | | +------------------------------------+--------+--------------+ | Creation of a pairwise binding | 409 | uniqueness | | with a DID already used in another | | | | active pairwise binding within the | | | | same administrative scope | | | +------------------------------------+--------+--------------+ | PATCH attempts to modify an | 400 | mutability | | immutable attribute (user, | | | | correlationModel) | | | +------------------------------------+--------+--------------+ | PATCH attempts to modify a | 400 | mutability | | readOnly attribute (status, | | | | lastValidationAttempt) | | | +------------------------------------+--------+--------------+ | Multiple active bindings with | 400 | invalidValue | | primary=true would result from the | | | | operation | | | +------------------------------------+--------+--------------+ | DELETE attempted on an active | 409 | - | | binding when the server requires | | | | non-active status first | | | +------------------------------------+--------+--------------+ Table 9: Binding-Specific Error Conditions 7. Discovery and Deployment A service provider implementing this specification MUST publish the User extension schema via /Schemas, MUST publish the IdentityBinding schema via /Schemas, MUST publish the IdentityBinding resource type via /ResourceTypes, and SHOULD publish the ServiceProviderConfig extension when supported. Examples of the expected /Schemas and /ResourceTypes entries are provided in Appendix C. Kushwaha Expires 31 October 2026 [Page 22] Internet-Draft SCIM DID/VC Binding April 2026 A SCIM client unaware of this specification will continue to interoperate with base User provisioning because unknown schema extensions and unknown resource types are discoverable rather than mandatory for unrelated operations. 8. Security Considerations 8.1. Threat Model Relevant attackers include a client that attempts to bind a DID it does not control, a client that replays stale credentials or proofs, an attacker exploiting DID key rotation or deactivation lag, an attacker inducing false correlation by reusing identifiers across relying parties, a malicious or unexpected issuer, and a compromised or confused delegated verifier. 8.2. Required Mitigations A conforming implementation MUST evaluate DID proof authorization against the relevant DID verification relationship at verification time, MUST re-resolve DID information when revalidating a binding after key rotation or deactivation events are possible, MUST treat credential status as a verifier-side check when status information is available, MUST integrity-protect communication with any delegated verifier and authenticate that verifier, MUST apply normal SCIM authorization controls to IdentityBinding resources, and MUST NOT treat unverified bindings as equivalent to active verified bindings. 8.3. DID Control Proof Delivery This specification requires that a SCIM server verify DID control before activating a binding, but the mechanism by which a client presents DID control evidence is intentionally out of scope. Implementers are responsible for defining or adopting a proof transport mechanism appropriate for their deployment. Relevant existing specifications include OpenID for Verifiable Presentations (OID4VP) and the DIF Presentation Exchange specification. The SCIM service provider MUST document the proof delivery mechanism it accepts as part of its deployment documentation. Regardless of the mechanism chosen, a server MUST NOT accept a DID control proof that was generated for a different relying party, binding resource, or session. Servers SHOULD require proof presentations to include a challenge or nonce issued by the server to prevent replay of previously valid proofs. Kushwaha Expires 31 October 2026 [Page 23] Internet-Draft SCIM DID/VC Binding April 2026 8.4. Replay Attack Mitigation A server SHOULD issue a fresh, single-use nonce or challenge when initiating a DID control proof exchange and MUST reject proof presentations that do not bind to the current challenge. Similarly, credential validation results MUST be treated as bound to a specific validation timestamp and MUST NOT be replayed from a prior successful validation to satisfy a new validation request. 8.5. Delegated Verifier Trust Scope When a SCIM service provider delegates DID or VC validation to an external verifier, the verifier becomes a critical trust anchor for the entire binding model. A compromised or misconfigured delegated verifier that returns status=verified for any DID can activate bindings without genuine cryptographic proof of control. Implementations MUST scope the trust granted to a delegated verifier to the minimum necessary (e.g., specific DID methods or credential types), MUST authenticate the verifier at the transport layer, and SHOULD audit verifier responses for anomalies such as bulk activation of previously-pending bindings. 9. Privacy Considerations DID Core warns that globally unambiguous identifiers create correlation risk and recommends pairwise DIDs where correlation is not desired. DID Core also warns that even pairwise DIDs can be re- correlated if DID documents reuse identical verification methods or correlating service endpoints. VC Data Model 2.0 separately warns about identifier-based, signature-based, and metadata-based correlation and recommends selective disclosure or unlinkable disclosure when strong anti-correlation properties are needed [DID-CORE] [VC-DATA-MODEL-2.0]. Accordingly, an implementation conforming to this specification SHOULD prefer correlationModel=pairwise unless public reuse is intentionally desired, MUST NOT require storage of full VC payloads for routine SCIM provisioning behavior, SHOULD store only references and normalized validation outcomes, SHOULD avoid exposing DID values to clients that do not need them, SHOULD support privacy-preserving credential ecosystems that use selective disclosure or unlinkable disclosure, and SHOULD ensure that pairwise bindings do not accidentally reuse correlating DID material within the same administrative domain. The credentials.holder and credentials.credentialSubjectId sub- attributes, while optional, present a specific privacy risk: both typically contain DID URIs that directly identify the subject, and Kushwaha Expires 31 October 2026 [Page 24] Internet-Draft SCIM DID/VC Binding April 2026 storing them in a SCIM resource makes the SCIM server itself a correlation point linking subject DIDs to SCIM account identifiers. This partially defeats the anti-correlation goals of pairwise DID usage. Implementations SHOULD omit these fields unless there is a specific operational requirement for them, and SHOULD apply appropriate access controls to limit which clients can read them when they are stored. Even with pairwise DIDs and minimal storage, the SCIM service provider itself becomes a correlation point because it holds the mapping between all of a user's pairwise DIDs and their single SCIM account identifier. Access to IdentityBinding resources MUST be restricted to authorized clients, and implementations SHOULD apply data-minimization principles to SCIM query responses (e.g., using SCIM attribute projection via the attributes or excludedAttributes query parameters). 10. IANA Considerations This document requests registration of the following URIs in the "System for Cross-domain Identity Management (SCIM) Schema URIs" registry defined by [RFC7643]: * urn:ietf:params:scim:schemas:extension:didvc:2.0:User * urn:ietf:params:scim:schemas:extension:didvc:2.0:IdentityBinding * urn:ietf:params:scim:schemas:extension:didvc:2.0:ServiceProviderConfig The registration templates appear in Appendix A. 11. References 11.1. Normative References [DID-CORE] World Wide Web Consortium, "Decentralized Identifiers (DIDs) v1.0", W3C Recommendation did-1.0, 19 July 2022, . [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC7643] Hunt, P., Ed., Grizzle, K., Wahlstroem, E., and C. Mortimore, "System for Cross-domain Identity Management: Core Schema", RFC 7643, DOI 10.17487/RFC7643, September 2015, . Kushwaha Expires 31 October 2026 [Page 25] Internet-Draft SCIM DID/VC Binding April 2026 [RFC7644] Hunt, P., Ed., Grizzle, K., Ansari, M., Wahlstroem, E., and C. Mortimore, "System for Cross-domain Identity Management: Protocol", RFC 7644, DOI 10.17487/RFC7644, September 2015, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . [RFC8259] Bray, T., Ed., "The JavaScript Object Notation (JSON) Data Interchange Format", STD 90, RFC 8259, DOI 10.17487/RFC8259, December 2017, . [VC-DATA-MODEL-2.0] World Wide Web Consortium, "Verifiable Credentials Data Model v2.0", W3C Recommendation vc-data-model-2.0, 15 May 2025, . 11.2. Informative References [RFC9865] Peterson, M., Ed., Zollner, D., and A. Sehgal, "Cursor- Based Pagination of System of Cross-domain Identity Management (SCIM) Resources", RFC 9865, DOI 10.17487/RFC9865, October 2025, . Appendix A. SCIM Schema URI Registration Templates A.1. User Extension Schema URI: urn:ietf:params:scim:schemas:extension:didvc:2.0:User Schema Name: DID and VC User Extension Intended or Associated Resource Type: User Purpose: Read-only discovery of DID and VC binding state for a SCIM user. Single-value Attributes: primaryDid, bindingState. Multi-valued Attributes: bindingRefs. A.2. IdentityBinding Schema URI: urn:ietf:params:scim:schemas:extension:didvc:2.0:IdentityBinding Kushwaha Expires 31 October 2026 [Page 26] Internet-Draft SCIM DID/VC Binding April 2026 Schema Name: IdentityBinding Intended or Associated Resource Type: IdentityBinding Purpose: Mutable binding resource linking a SCIM User to one or more DIDs and optional credential references. Single-value Attributes: user, correlationModel, status, lastValidationAttempt, and statusReason. Multi-valued Attributes: dids and credentials. A.3. ServiceProviderConfig Extension Schema URI: urn:ietf:params:scim:schemas:extension:didvc:2.0:ServiceProviderConfig Schema Name: DID and VC ServiceProviderConfig Extension Intended or Associated Resource Type: ServiceProviderConfig Purpose: Capability discovery for DID and VC binding support. Single-value Attributes: enabled and verificationDelegation. Multi-valued Attributes: supportedDidMethods, supportedCredentialChecks, and supportedCorrelationModels. Appendix B. Examples B.1. Example User Representation Kushwaha Expires 31 October 2026 [Page 27] Internet-Draft SCIM DID/VC Binding April 2026 { "schemas": [ "urn:ietf:params:scim:schemas:core:2.0:User", "urn:ietf:params:scim:schemas:extension:didvc:2.0:User" ], "id": "2819c223-7f76-453a-919d-413861904646", "userName": "alice@example.com", "name": { "givenName": "Alice", "familyName": "Ng" }, "urn:ietf:params:scim:schemas:extension:didvc:2.0:User": { "primaryDid": "did:example:abc123", "bindingState": "active", "bindingRefs": [ { "value": "c3a801b0-0b28-4c9c-a7fb-9964a6d916c1", "$ref": "/IdentityBindings/c3a801b0-0b28-4c9c-a7fb-9964a6d916c1", "display": "Primary workforce binding", "primary": true, "status": "active" } ] } } Figure 8 B.2. Example IdentityBinding Representation Kushwaha Expires 31 October 2026 [Page 28] Internet-Draft SCIM DID/VC Binding April 2026 { "schemas": [ "urn:ietf:params:scim:schemas:extension:didvc:2.0:IdentityBinding" ], "id": "c3a801b0-0b28-4c9c-a7fb-9964a6d916c1", "meta": { "resourceType": "IdentityBinding", "created": "2026-04-20T09:00:00Z", "lastModified": "2026-04-21T14:37:00Z", "location": "/IdentityBindings/c3a801b0-0b28-4c9c-a7fb-9964a6d916c1", "version": "W/\"3694e05afa83191e\"" }, "user": { "value": "2819c223-7f76-453a-919d-413861904646", "$ref": "/Users/2819c223-7f76-453a-919d-413861904646", "display": "Alice Ng" }, "correlationModel": "pairwise", "dids": [ { "value": "did:example:abc123", "relationship": "primary", "verificationMethod": "did:example:abc123#key-1", "proofPurpose": "authentication", "controller": "did:example:abc123", "primary": true, "status": "verified" } ], "credentials": [ { "credentialId": "urn:uuid:4dd2dc49-9c0f-43f8-b96e-4f4d1f578a2d", "types": ["VerifiableCredential", "EmploymentCredential"], "issuer": "did:example:issuer:acme", "statusRef": "https://issuer.example/status/94567", "schemaRef": "https://issuer.example/schema/employment-v1", "validFrom": "2026-04-01T00:00:00Z", "validUntil": "2027-04-01T00:00:00Z", "status": "active" } ], "status": "active", "lastValidationAttempt": "2026-04-21T14:37:00Z", "statusReason": "DID control and required credential checks succeeded" } Figure 9 Kushwaha Expires 31 October 2026 [Page 29] Internet-Draft SCIM DID/VC Binding April 2026 B.3. Example ServiceProviderConfig Representation { "schemas": [ "urn:ietf:params:scim:schemas:core:2.0:ServiceProviderConfig", "urn:ietf:params:scim:schemas:extension:didvc:2.0:ServiceProviderConfig" ], "patch": { "supported": true }, "filter": { "supported": true, "maxResults": 200 }, "sort": { "supported": false }, "etag": { "supported": true }, "urn:ietf:params:scim:schemas:extension:didvc:2.0:ServiceProviderConfig": { "enabled": true, "verificationDelegation": "mixed", "supportedDidMethods": ["did:web", "did:key", "did:example"], "supportedCredentialChecks": ["status", "schema", "validity", "holderBinding"], "supportedCorrelationModels": ["pairwise", "shared", "public"] } } Figure 10 Appendix C. Discovery Examples C.1. Example /ResourceTypes Entry for IdentityBinding The following illustrates the ResourceType entry a conforming server MUST publish at /ResourceTypes for the IdentityBinding resource. { "schemas": ["urn:ietf:params:scim:schemas:core:2.0:ResourceType"], "id": "IdentityBinding", "name": "IdentityBinding", "endpoint": "/IdentityBindings", "description": "Auditable linkage between a SCIM User and one or more DIDs and credential references.", "schema": "urn:ietf:params:scim:schemas:extension:didvc:2.0:IdentityBinding", "meta": { "resourceType": "ResourceType", "location": "/ResourceTypes/IdentityBinding" } } Figure 11 Kushwaha Expires 31 October 2026 [Page 30] Internet-Draft SCIM DID/VC Binding April 2026 C.2. Example /Schemas Entry for the User Extension The following illustrates the Schema entry a conforming server MUST publish at /Schemas for the User extension defined by this specification. The entry for the IdentityBinding schema and the ServiceProviderConfig extension schema follow the same pattern. { "schemas": ["urn:ietf:params:scim:schemas:core:2.0:Schema"], "id": "urn:ietf:params:scim:schemas:extension:didvc:2.0:User", "name": "DID and VC User Extension", "description": "Read-only discovery of DID and VC binding state for a SCIM user.", "attributes": [ { "name": "primaryDid", "type": "string", "multiValued": false, "required": false, "mutability": "readOnly", "returned": "default" }, { "name": "bindingState", "type": "string", "multiValued": false, "required": true, "canonicalValues": ["none", "pending", "active", "suspended", "revoked", "rejected"], "mutability": "readOnly", "returned": "default" }, { "name": "bindingRefs", "type": "complex", "multiValued": true, "required": false, "mutability": "readOnly", "returned": "default", "subAttributes": [ { "name": "value", "type": "string", "required": true, "mutability": "readOnly" }, { "name": "$ref", "type": "reference", "required": true, "mutability": "readOnly" }, { "name": "display", "type": "string", "required": false, "mutability": "readOnly" }, { "name": "primary", "type": "boolean", "required": false, "mutability": "readOnly" }, { "name": "status", "type": "string", "required": true, "canonicalValues": ["pending", "active", "suspended", "revoked", "rejected"], "mutability": "readOnly" Kushwaha Expires 31 October 2026 [Page 31] Internet-Draft SCIM DID/VC Binding April 2026 } ] } ], "meta": { "resourceType": "Schema", "location": "/Schemas/urn:ietf:params:scim:schemas:extension:didvc:2.0:User" } } Figure 12 Acknowledgments The author thanks contributors and reviewers whose feedback will be acknowledged in future revisions of this document. Author's Address Saurabh Kushwaha Oracle Corporation Pleasanton, CA United States of America Email: saurabh.kushwaha@oracle.com Kushwaha Expires 31 October 2026 [Page 32]