SlideShare a Scribd company logo
1 of 55
Download to read offline
SCIM: Why It’s More
Important, and More
Simple, Than You Think
Kelly Grizzle
Software Architect - SailPoint
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.2
Agenda
• What is SCIM?
• Why is it important?
• How is it being used?
• Deeper Dive
• How simple is it?
What is SCIM?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.4
System for
Cross-Domain
Identity
Management* And yes … it is also simple
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.5
What is SCIM?
•  SCIM is a standard that defines schema and protocol for identity
management.
•  Schema
-  Users and Groups
-  Extensible
-  JSON
•  Protocol
-  REST
-  CRUD + Search + Discovery + Bulk
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.6
Identity Protocol Landscape
Provisioning Authentication Authorization
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.7
What problems does SCIM solve?
• How do I keep my organization’s users in sync with
service X?
-  How do I provision a user account for service X?
-  How do I deprovision a user account from service X?
-  How do I update an existing account for service X?
• How do I manage groups?
-  How do I add or remove users from groups to give them the
correct level of access?
-  How do I create new groups?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.8
An example speaks 1111101000 words…
POST /v2/Users HTTP/1.1
Host: example.com
Accept: application/json
Content-Type: application/json
Authorization: Bearer h480djs93hd8
Content-Length: ...
{
"schemas": ["urn:scim:schemas:core:2.0:User"],
"externalId": "bjensen",
"userName":"bjensen",
"name": {
"familyName": "Jensen",
"givenName": "Barbara"
}
}
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.9
History Lesson
July ‘10
Conceived
at CIS
May ‘11
Work starts
under OWF
Dec ‘11
Version 1.0
June/July ‘12
IETF WG
chartered
Version 1.1
Late ‘14
Version 2.0
Why is SCIM
important?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.11
A typical environment
Firewall
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.12
That’s the typical case … Ouch!
•  Environments are complex
-  Many systems both on-prem and off-prem
•  Every system has to deal with identity
-  Name, email, title, custom meta-information, entitlements, …
•  Identity must be maintained across systems
-  Need one-way and often two-way synchronization
•  Authorization is often driven from an external system
-  Example: Active Directory groups drive groups and
permissions in other applications.
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.13
Other common pain points
•  Mergers and acquisitions
-  Need to quickly connect applications after M&A
•  BYOA (bring your own app)
-  Proliferation of SaaS apps has lead to using applications that
IT does not even know about
•  Mobile
-  Another case of BYOA where mobile apps need identity
information
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.14
How is identity management done?
•  Manual hand-entry
-  Error prone and slow
•  Bulk upload
-  High latency – often a one-time operation
•  Custom APIs and connectors
-  High cost to develop against
-  Proprietary to each service provider
•  SAML Just-in-Time Provisioning
-  No pre-provisioning
-  No deprovisioning
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.15
And then … there’s SCIM
•  Low cost to develop
-  Write once and reuse
-  Open source libraries
-  Well-known and agreed upon standard
•  Handles full lifecycle of identity
-  Create, update, AND delete
•  Real-time
-  No waiting for manual intervention
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.16
Who else thinks SCIM is important?
How is SCIM
being used?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.18
Surprisingly – not just in the cloud
•  SCIM was initially created with cloud use cases in mind
•  It turns out that a common language to move identities on-
premises is really useful
•  This is some of the first “real world” adoption of SCIM
•  Case study: Large company with 3500 connected
applications and 82,000 users moved to SCIM for internal
systems
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.19
In the enterprise
Firewall
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.20
Unsurprisingly – also in the cloud
•  SaaS providers have started implementing SCIM for their
identity APIs
-  Salesforce.com, Cisco Webex, etc…
•  Clients call these APIs from an on-premises identity
management system to manage identities
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.21
Ground to cloud
Firewall
SCIM
Proprietary
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.22
Cloud Identity Bridge
•  Important when on-premises applications need to be
managed from the cloud
•  Allows a single, secured SCIM channel through the firewall
•  Translates SCIM requests to native APIs behind the firewall
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.23
Cloud to ground
Firewall
Identity Bridge
Cloud Identity
Management
Provider
SCIM
Native APIs
Deeper Dive
Schema
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.25
Schema
•  Core models for User and Group
•  JSON representation
•  Extensible
-  Extend existing resources (eg – enterprise user)
-  Define new resources (eg – role, entitlement, device)
-  JSON format for describing schema
-  Standard data types and references between objects
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.26
Example: User
{
"schemas": ["urn:scim:schemas:core:2.0:User"],
"id": "2819c223-7f76-453a-919d-413861904646",
"externalId": "bjensen",
"meta": {
"resourceType": "User",
"created": "2011-08-01T18:29:49.793Z",
"lastModified": "2011-08-01T18:29:49.793Z",
"location": "https://example.com/v1/Users/2819c223...",
"version": "W/"f250dd84f0671c3"
},
"name": {
"formatted": "Ms. Barbara J Jensen III",
"familyName": "Jensen",
"givenName": "Barbara"
},
"userName": "bjensen",
"phoneNumbers": [
{
"value": "555-555-8377",
"type": "work"
}
]
}
Required
Complex
Simple
Multi-valued
Object type
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.27
Example: Extended User
{
"schemas":["urn:scim:schemas:core:2.0:User",
"urn:scim:schemas:extension:enterprise:2.0:User"],
"id": "2819c223-7f76-453a-919d-413861904646",
"externalId": "bjensen",
"userName": "bjensen",
"urn:scim:schemas:extension:enterprise:2.0:User": {
"employeeNumber": "701984",
"costCenter": "4130",
"organization": "Universal Studios",
"division": "Theme Park",
"department": "Tour Operations",
"manager": {
"managerId": "26118915-6090-4610-87e4-49d8ca9f808d",
"$ref": "/Users/26118915-6090-4610-87e4-49d8ca9f808d",
"displayName": "John Smith"
}
}
}
Declaration
Use
Deeper Dive
API
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.29
Operations
•  Create = POST https://example.com/{v}/{resource}
•  Read = GET https://example.com/{v}/{resource}/{id}
•  Update = PUT https://example.com/{v}/{resource}/{id}
•  Delete = DELETE https://example.com/{v}/{resource}/{id}
•  *Update = PATCH https://example.com/{v}/{resource}/{id}
•  *Search = GET https://example.com/{v}/{resource}?
filter={attribute} {op} {value} & sortBy={attributeName} &
sortOrder={ascending|descending} & startIndex={start} &
count={maxResults}
•  *Bulk
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.30
Create Request
POST /v2/Users HTTP/1.1
Host: example.com
Accept: application/json
Authorization: Bearer h480djs93hd8
{
"schemas": ["urn:scim:schemas:core:2.0:User"],
"externalId": "bjensen",
"userName":"bjensen",
"name": {
"familyName": "Jensen",
"givenName": "Barbara"
}
}
Operation Resource Type
AuthZ
“User” Payload
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.31
Create Response
HTTP/1.1 201 Created
Content-Type: application/json
Location: https://example.com/v2/Users/281...
ETag: W/"e180ee84f0671b1"
{
"schemas": ["urn:scim:schemas:core:2.0:User"],
"id": "2819c223-7f76-453a-919d-413861904646",
"externalId": "bjensen",
"meta": {
"created": "2011-08-01T21:32:44.882Z",
"lastModified": "2011-08-01T21:32:44.882Z",
"location": "https://example.com/v2/Users/281...",
"version": "W/"e180ee84f0671b1""
},
"name":{
"familyName":"Jensen",
...
Result code
“Permalink”
SP generated ID
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.32
Discovery
•  GET /Schemas
-  Defines primary object definitions and extensions
•  GET /ResourceTypes
-  Defines available resources
•  endpoint URL, primary schema, schema extensions
•  GET /ServiceProviderConfigs
-  Spec compliance
•  Support for bulk, patch, etc…
-  Authentication schemes
•  OAuth, HTTP basic, etc…
Deeper Dive
Extensions
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.34
Extending an existing resource type
•  The SCIM core schema objects – User and Group – try to
cover the common 80%
•  Almost always extended by service providers to add custom
attributes
•  Only two steps required:
1.  Create a new schema that contains the extended attributes
2.  Add the new schema to the schemaExtensions list for the
resource type
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.35
Extending – Schema
{
"id" : "urn:grizzle:1.0:ConferenceGoer",
"name" : "Conference Goer",
"description" : "Info about a person that attends CIS",
"attributes" : [{
"name" : "shirtSize",
"type" : "string",
"multiValued" : false,
"description" : "What conference doesn't have a t-shirt?",
"required" : false,
"caseExact" : false,
"mutability" : "readWrite",
"returned" : "always",
"uniqueness" : "server"
}]
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.36
Extending – Resource Type
{
"schemas": ["urn:scim:schemas:core:2.0:ResourceType"],
"id":"User",
"name":"User",
"endpoint": "/Users",
"description": "Core User",
"schema": "urn:scim:schemas:core:2.0:User",
"schemaExtensions": [{
"schema": "urn:grizzle:1.0:ConferenceGoer",
"required": false
}
]
}
Add custom
extensions
here
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.37
Creating a custom resource type
•  Completely new resource types may be created to model
objects that are unique to the service provider
•  Client can use /ResourceTypes endpoint to discover these
•  Somewhat common for service providers to implement
•  Only two steps required:
1.  Create a new schema that contains the attributes
2.  Create a new resource type that references this schema
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.38
Custom resource type – Schema
{
"id" : "urn:grizzle:1.0:BlogPost",
"name" : "Blog Post",
"description" : "A post to a blog",
"attributes" : [{
"name" : "title",
"type" : "string",
"multiValued" : false,
"description" : "The title of the blog post",
"required" : true,
"caseExact" : false,
"mutability" : "readWrite",
"returned" : "always",
"uniqueness" : "server"
},
... other attributes - id, content, author, date, etc ...
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.39
Custom resource type – Resource Type
{
"schemas": ["urn:scim:schemas:core:2.0:ResourceType"],
"id": "BlogPost",
"name": "Blog Post",
"endpoint": "/BlogPosts",
"description": "Posts to a boring blog",
"schema": "urn:grizzle:1.0:BlogPost"
}
Reference the custom schema
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.40
Custom resource type – GET Request
GET /v2/BlogPosts
Host: example.com
Authorization: Bearer h480djs93hd8
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.41
Custom resource type – GET Response
HTTP/1.1 200 OK
Content-Type: application/json
{
"schemas": ["urn:scim:api:messages:2.0:ListResponse"],
"totalResults": 5,
"Resources": [{
"id": "281838-af839018e4-8377ba87e90",
"title": "Welcome to my blog!",
"content": "...",
"meta": {
"resourceType": "BlogPost",
"created": "2011-08-01T21:32:44.882Z",
"lastModified": "2011-08-01T21:32:44.882Z",
"location": "https://example.com/v2/BlogPosts/281..."
How simple is
SCIM?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.43
SCIM Core Values
•  Simplicity
-  “Make it as simple as possible but no simpler.”
- Einstein
•  Solving real-world problems
•  Ease of implementation by consumers
-  Don’t make it too hard for service providers either
•  Support the 80% in the core
-  Extensions for everything else
•  Interoperability
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.44
How to kick the tires
•  Download the UnboundID Reference Server Implementation
if you need a server to test against
-  https://www.unboundid.com/resources/scim/
•  If you are trying to play with a service provider’s API
-  cURL
-  REST Console (Chrome Extension)
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.45
cURL
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.46
REST Console
•  A Chrome extension that easily allows making REST calls
•  Use this if a command line scares you
•  There are other alternatives out there
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.47
Getting under the hood
•  If you want to write a SCIM client or server there are a number of
open source libraries
•  Most libraries currently support SCIM 1.1 (not 2.0)
•  UnboundID SDK
-  Client and server java libraries
-  Most full-featured and well maintained
•  python-scim
-  SCIM object models for Python
•  scim-query-filter-parser
-  Search filter parsing library for Ruby
•  More at http://www.simplecloud.info/#implementations
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.48
UnboundID SDK
•  Open source and developed by UnboundID
•  Recent enhancements to improve client usability -
https://code.google.com/p/scimsdk/source/detail?r=355
•  I prototyped a SCIM server and wrote a library to make
server development easier
-  Library cut the lines of code by 68% (down to <300)
-  Needs a bit of work to be ready for prime time
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.49
It’s so easy even Mark Diodati can do it!
•  Mark wrote a SCIM client while an analyst at Gartner
•  Written in Perl
•  Reads attributes from a SCIM server and writes to an Excel
file
•  Reads changes in Excel file and synchronizes them to a
SCIM server
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.50
Wait … I already have a REST API!
•  Option 1: Have a separate URL-space for identity-related
SCIM APIs
-  https://example.com/rest/MyObjects
-  https://example.com/rest/scim/Users
•  Option 2: Consider using SCIMs schemas and resource
types to define your entire REST API
-  It is already well-defined
-  Supports many data types and references between objects
-  It is self-describing through /Schemas and /ResourceTypes
-  Make use of SCIM libraries for fast implementation
•  Just do it! Customers constantly ask for a common API!
What next?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.52
Key take-aways
•  Identity and app proliferation = frustration
•  SCIM is the only sustainable option that can handle the
scale and complexity of provisioning in today’s environments
•  Build a standards-based identity infrastructure
-  Provisioning à SCIM
-  Authentication à OpenID Connect or SAML
-  Authorization à OAuth2
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.53
What does it mean for me?
•  Consider using SCIM for your internal environment
-  Not just a cloud API
•  SCIM is a good foundation for any REST API
-  It can be used for more than just identities
•  It’s easy to get started if you use the tools that are already
available
•  Use SCIM 1.1 for now
-  Real-world adoption of SCIM 2.0 will happen in 2015
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.54
References
• Start here…
- http://www.simplecloud.info/
•  Get involved here…
-  http://www.ietf.org/mail-archive/web/scim/current/maillist.html
•  All of the gory details here…
-  http://datatracker.ietf.org/wg/scim/documents/
-  http://datatracker.ietf.org/doc/draft-ietf-scim-api/
-  http://datatracker.ietf.org/doc/draft-ietf-scim-core-schema/
•  Implementing a client or server in Java? Start here…
-  https://www.unboundid.com/resources/scim/
•  Implementing a client or server in not Java? Start here…
-  http://www.simplecloud.info/#implementations
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.55
Questions
kelly.grizzle@sailpoint.com
@kelly_grizzle
http://simplecloud.info

More Related Content

What's hot

CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CloudIDSummit
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMWSO2
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMHasiniG
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementNishant Kaushik
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCloudIDSummit
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platformOracleIDM
 
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestCANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestChris Phillips
 
Mr. desmond cloud security_format
Mr. desmond cloud security_formatMr. desmond cloud security_format
Mr. desmond cloud security_formatMULTIMATICS_ID
 
Oracle UCM: Web Site Performance Tuning
Oracle UCM: Web Site Performance TuningOracle UCM: Web Site Performance Tuning
Oracle UCM: Web Site Performance TuningBrian Huff
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)Brian Huff
 
Oracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationOracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationDelivery Centric
 
Deploying an Extranet on SharePoint
Deploying an Extranet on SharePointDeploying an Extranet on SharePoint
Deploying an Extranet on SharePointAlan Marshall
 
Round table guide
Round table guideRound table guide
Round table guideOracleIDM
 
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeThuan Ng
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trinings
 
Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportionsOracleIDM
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in checkOracleIDM
 

What's hot (20)

CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestCANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
 
Mr. desmond cloud security_format
Mr. desmond cloud security_formatMr. desmond cloud security_format
Mr. desmond cloud security_format
 
Oracle UCM: Web Site Performance Tuning
Oracle UCM: Web Site Performance TuningOracle UCM: Web Site Performance Tuning
Oracle UCM: Web Site Performance Tuning
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
 
Oracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationOracle Directory Services - Customer Presentation
Oracle Directory Services - Customer Presentation
 
Deploying an Extranet on SharePoint
Deploying an Extranet on SharePointDeploying an Extranet on SharePoint
Deploying an Extranet on SharePoint
 
Round table guide
Round table guideRound table guide
Round table guide
 
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in check
 

Similar to CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think

CIS 2015 SCIM in the Real World - Kelly Grizzle
CIS 2015 SCIM in the Real World -  Kelly GrizzleCIS 2015 SCIM in the Real World -  Kelly Grizzle
CIS 2015 SCIM in the Real World - Kelly GrizzleCloudIDSummit
 
School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComTaunyaCoffman887
 
Gcp intro-20160721
Gcp intro-20160721Gcp intro-20160721
Gcp intro-20160721Haeseung Lee
 
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018Amazon Web Services
 
#SPSOttawa introduction to the #microsoftGraph
#SPSOttawa introduction to the #microsoftGraph#SPSOttawa introduction to the #microsoftGraph
#SPSOttawa introduction to the #microsoftGraphVincent Biret
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deploymentsSAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deploymentsChris Kernaghan
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Perficient
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterForgeRock
 
Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...Sara Barbosa
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud finalsapenov
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak
 
What serverless means for enterprise apps
What serverless means for enterprise appsWhat serverless means for enterprise apps
What serverless means for enterprise appsSumit Sarkar
 
Applying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationApplying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationKacy Clarke
 

Similar to CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think (20)

CIS 2015 SCIM in the Real World - Kelly Grizzle
CIS 2015 SCIM in the Real World -  Kelly GrizzleCIS 2015 SCIM in the Real World -  Kelly Grizzle
CIS 2015 SCIM in the Real World - Kelly Grizzle
 
School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud Com
 
Gcp intro-20160721
Gcp intro-20160721Gcp intro-20160721
Gcp intro-20160721
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
 
#SPSOttawa introduction to the #microsoftGraph
#SPSOttawa introduction to the #microsoftGraph#SPSOttawa introduction to the #microsoftGraph
#SPSOttawa introduction to the #microsoftGraph
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
 
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deploymentsSAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud final
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
What serverless means for enterprise apps
What serverless means for enterprise appsWhat serverless means for enterprise apps
What serverless means for enterprise apps
 
Applying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationApplying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migration
 
Choosing and Using Cloud Services with SharePoint
Choosing and Using Cloud Services with SharePointChoosing and Using Cloud Services with SharePoint
Choosing and Using Cloud Services with SharePoint
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think

  • 1. SCIM: Why It’s More Important, and More Simple, Than You Think Kelly Grizzle Software Architect - SailPoint
  • 2. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.2 Agenda • What is SCIM? • Why is it important? • How is it being used? • Deeper Dive • How simple is it?
  • 4. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.4 System for Cross-Domain Identity Management* And yes … it is also simple
  • 5. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.5 What is SCIM? •  SCIM is a standard that defines schema and protocol for identity management. •  Schema -  Users and Groups -  Extensible -  JSON •  Protocol -  REST -  CRUD + Search + Discovery + Bulk
  • 6. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.6 Identity Protocol Landscape Provisioning Authentication Authorization
  • 7. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.7 What problems does SCIM solve? • How do I keep my organization’s users in sync with service X? -  How do I provision a user account for service X? -  How do I deprovision a user account from service X? -  How do I update an existing account for service X? • How do I manage groups? -  How do I add or remove users from groups to give them the correct level of access? -  How do I create new groups?
  • 8. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.8 An example speaks 1111101000 words… POST /v2/Users HTTP/1.1 Host: example.com Accept: application/json Content-Type: application/json Authorization: Bearer h480djs93hd8 Content-Length: ... { "schemas": ["urn:scim:schemas:core:2.0:User"], "externalId": "bjensen", "userName":"bjensen", "name": { "familyName": "Jensen", "givenName": "Barbara" } }
  • 9. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.9 History Lesson July ‘10 Conceived at CIS May ‘11 Work starts under OWF Dec ‘11 Version 1.0 June/July ‘12 IETF WG chartered Version 1.1 Late ‘14 Version 2.0
  • 11. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.11 A typical environment Firewall
  • 12. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.12 That’s the typical case … Ouch! •  Environments are complex -  Many systems both on-prem and off-prem •  Every system has to deal with identity -  Name, email, title, custom meta-information, entitlements, … •  Identity must be maintained across systems -  Need one-way and often two-way synchronization •  Authorization is often driven from an external system -  Example: Active Directory groups drive groups and permissions in other applications.
  • 13. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.13 Other common pain points •  Mergers and acquisitions -  Need to quickly connect applications after M&A •  BYOA (bring your own app) -  Proliferation of SaaS apps has lead to using applications that IT does not even know about •  Mobile -  Another case of BYOA where mobile apps need identity information
  • 14. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.14 How is identity management done? •  Manual hand-entry -  Error prone and slow •  Bulk upload -  High latency – often a one-time operation •  Custom APIs and connectors -  High cost to develop against -  Proprietary to each service provider •  SAML Just-in-Time Provisioning -  No pre-provisioning -  No deprovisioning
  • 15. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.15 And then … there’s SCIM •  Low cost to develop -  Write once and reuse -  Open source libraries -  Well-known and agreed upon standard •  Handles full lifecycle of identity -  Create, update, AND delete •  Real-time -  No waiting for manual intervention
  • 16. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.16 Who else thinks SCIM is important?
  • 18. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.18 Surprisingly – not just in the cloud •  SCIM was initially created with cloud use cases in mind •  It turns out that a common language to move identities on- premises is really useful •  This is some of the first “real world” adoption of SCIM •  Case study: Large company with 3500 connected applications and 82,000 users moved to SCIM for internal systems
  • 19. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.19 In the enterprise Firewall
  • 20. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.20 Unsurprisingly – also in the cloud •  SaaS providers have started implementing SCIM for their identity APIs -  Salesforce.com, Cisco Webex, etc… •  Clients call these APIs from an on-premises identity management system to manage identities
  • 21. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.21 Ground to cloud Firewall SCIM Proprietary
  • 22. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.22 Cloud Identity Bridge •  Important when on-premises applications need to be managed from the cloud •  Allows a single, secured SCIM channel through the firewall •  Translates SCIM requests to native APIs behind the firewall
  • 23. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.23 Cloud to ground Firewall Identity Bridge Cloud Identity Management Provider SCIM Native APIs
  • 25. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.25 Schema •  Core models for User and Group •  JSON representation •  Extensible -  Extend existing resources (eg – enterprise user) -  Define new resources (eg – role, entitlement, device) -  JSON format for describing schema -  Standard data types and references between objects
  • 26. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.26 Example: User { "schemas": ["urn:scim:schemas:core:2.0:User"], "id": "2819c223-7f76-453a-919d-413861904646", "externalId": "bjensen", "meta": { "resourceType": "User", "created": "2011-08-01T18:29:49.793Z", "lastModified": "2011-08-01T18:29:49.793Z", "location": "https://example.com/v1/Users/2819c223...", "version": "W/"f250dd84f0671c3" }, "name": { "formatted": "Ms. Barbara J Jensen III", "familyName": "Jensen", "givenName": "Barbara" }, "userName": "bjensen", "phoneNumbers": [ { "value": "555-555-8377", "type": "work" } ] } Required Complex Simple Multi-valued Object type
  • 27. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.27 Example: Extended User { "schemas":["urn:scim:schemas:core:2.0:User", "urn:scim:schemas:extension:enterprise:2.0:User"], "id": "2819c223-7f76-453a-919d-413861904646", "externalId": "bjensen", "userName": "bjensen", "urn:scim:schemas:extension:enterprise:2.0:User": { "employeeNumber": "701984", "costCenter": "4130", "organization": "Universal Studios", "division": "Theme Park", "department": "Tour Operations", "manager": { "managerId": "26118915-6090-4610-87e4-49d8ca9f808d", "$ref": "/Users/26118915-6090-4610-87e4-49d8ca9f808d", "displayName": "John Smith" } } } Declaration Use
  • 29. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.29 Operations •  Create = POST https://example.com/{v}/{resource} •  Read = GET https://example.com/{v}/{resource}/{id} •  Update = PUT https://example.com/{v}/{resource}/{id} •  Delete = DELETE https://example.com/{v}/{resource}/{id} •  *Update = PATCH https://example.com/{v}/{resource}/{id} •  *Search = GET https://example.com/{v}/{resource}? filter={attribute} {op} {value} & sortBy={attributeName} & sortOrder={ascending|descending} & startIndex={start} & count={maxResults} •  *Bulk
  • 30. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.30 Create Request POST /v2/Users HTTP/1.1 Host: example.com Accept: application/json Authorization: Bearer h480djs93hd8 { "schemas": ["urn:scim:schemas:core:2.0:User"], "externalId": "bjensen", "userName":"bjensen", "name": { "familyName": "Jensen", "givenName": "Barbara" } } Operation Resource Type AuthZ “User” Payload
  • 31. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.31 Create Response HTTP/1.1 201 Created Content-Type: application/json Location: https://example.com/v2/Users/281... ETag: W/"e180ee84f0671b1" { "schemas": ["urn:scim:schemas:core:2.0:User"], "id": "2819c223-7f76-453a-919d-413861904646", "externalId": "bjensen", "meta": { "created": "2011-08-01T21:32:44.882Z", "lastModified": "2011-08-01T21:32:44.882Z", "location": "https://example.com/v2/Users/281...", "version": "W/"e180ee84f0671b1"" }, "name":{ "familyName":"Jensen", ... Result code “Permalink” SP generated ID
  • 32. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.32 Discovery •  GET /Schemas -  Defines primary object definitions and extensions •  GET /ResourceTypes -  Defines available resources •  endpoint URL, primary schema, schema extensions •  GET /ServiceProviderConfigs -  Spec compliance •  Support for bulk, patch, etc… -  Authentication schemes •  OAuth, HTTP basic, etc…
  • 34. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.34 Extending an existing resource type •  The SCIM core schema objects – User and Group – try to cover the common 80% •  Almost always extended by service providers to add custom attributes •  Only two steps required: 1.  Create a new schema that contains the extended attributes 2.  Add the new schema to the schemaExtensions list for the resource type
  • 35. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.35 Extending – Schema { "id" : "urn:grizzle:1.0:ConferenceGoer", "name" : "Conference Goer", "description" : "Info about a person that attends CIS", "attributes" : [{ "name" : "shirtSize", "type" : "string", "multiValued" : false, "description" : "What conference doesn't have a t-shirt?", "required" : false, "caseExact" : false, "mutability" : "readWrite", "returned" : "always", "uniqueness" : "server" }]
  • 36. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.36 Extending – Resource Type { "schemas": ["urn:scim:schemas:core:2.0:ResourceType"], "id":"User", "name":"User", "endpoint": "/Users", "description": "Core User", "schema": "urn:scim:schemas:core:2.0:User", "schemaExtensions": [{ "schema": "urn:grizzle:1.0:ConferenceGoer", "required": false } ] } Add custom extensions here
  • 37. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.37 Creating a custom resource type •  Completely new resource types may be created to model objects that are unique to the service provider •  Client can use /ResourceTypes endpoint to discover these •  Somewhat common for service providers to implement •  Only two steps required: 1.  Create a new schema that contains the attributes 2.  Create a new resource type that references this schema
  • 38. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.38 Custom resource type – Schema { "id" : "urn:grizzle:1.0:BlogPost", "name" : "Blog Post", "description" : "A post to a blog", "attributes" : [{ "name" : "title", "type" : "string", "multiValued" : false, "description" : "The title of the blog post", "required" : true, "caseExact" : false, "mutability" : "readWrite", "returned" : "always", "uniqueness" : "server" }, ... other attributes - id, content, author, date, etc ...
  • 39. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.39 Custom resource type – Resource Type { "schemas": ["urn:scim:schemas:core:2.0:ResourceType"], "id": "BlogPost", "name": "Blog Post", "endpoint": "/BlogPosts", "description": "Posts to a boring blog", "schema": "urn:grizzle:1.0:BlogPost" } Reference the custom schema
  • 40. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.40 Custom resource type – GET Request GET /v2/BlogPosts Host: example.com Authorization: Bearer h480djs93hd8
  • 41. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.41 Custom resource type – GET Response HTTP/1.1 200 OK Content-Type: application/json { "schemas": ["urn:scim:api:messages:2.0:ListResponse"], "totalResults": 5, "Resources": [{ "id": "281838-af839018e4-8377ba87e90", "title": "Welcome to my blog!", "content": "...", "meta": { "resourceType": "BlogPost", "created": "2011-08-01T21:32:44.882Z", "lastModified": "2011-08-01T21:32:44.882Z", "location": "https://example.com/v2/BlogPosts/281..."
  • 43. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.43 SCIM Core Values •  Simplicity -  “Make it as simple as possible but no simpler.” - Einstein •  Solving real-world problems •  Ease of implementation by consumers -  Don’t make it too hard for service providers either •  Support the 80% in the core -  Extensions for everything else •  Interoperability
  • 44. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.44 How to kick the tires •  Download the UnboundID Reference Server Implementation if you need a server to test against -  https://www.unboundid.com/resources/scim/ •  If you are trying to play with a service provider’s API -  cURL -  REST Console (Chrome Extension)
  • 45. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.45 cURL
  • 46. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.46 REST Console •  A Chrome extension that easily allows making REST calls •  Use this if a command line scares you •  There are other alternatives out there
  • 47. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.47 Getting under the hood •  If you want to write a SCIM client or server there are a number of open source libraries •  Most libraries currently support SCIM 1.1 (not 2.0) •  UnboundID SDK -  Client and server java libraries -  Most full-featured and well maintained •  python-scim -  SCIM object models for Python •  scim-query-filter-parser -  Search filter parsing library for Ruby •  More at http://www.simplecloud.info/#implementations
  • 48. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.48 UnboundID SDK •  Open source and developed by UnboundID •  Recent enhancements to improve client usability - https://code.google.com/p/scimsdk/source/detail?r=355 •  I prototyped a SCIM server and wrote a library to make server development easier -  Library cut the lines of code by 68% (down to <300) -  Needs a bit of work to be ready for prime time
  • 49. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.49 It’s so easy even Mark Diodati can do it! •  Mark wrote a SCIM client while an analyst at Gartner •  Written in Perl •  Reads attributes from a SCIM server and writes to an Excel file •  Reads changes in Excel file and synchronizes them to a SCIM server
  • 50. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.50 Wait … I already have a REST API! •  Option 1: Have a separate URL-space for identity-related SCIM APIs -  https://example.com/rest/MyObjects -  https://example.com/rest/scim/Users •  Option 2: Consider using SCIMs schemas and resource types to define your entire REST API -  It is already well-defined -  Supports many data types and references between objects -  It is self-describing through /Schemas and /ResourceTypes -  Make use of SCIM libraries for fast implementation •  Just do it! Customers constantly ask for a common API!
  • 52. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.52 Key take-aways •  Identity and app proliferation = frustration •  SCIM is the only sustainable option that can handle the scale and complexity of provisioning in today’s environments •  Build a standards-based identity infrastructure -  Provisioning à SCIM -  Authentication à OpenID Connect or SAML -  Authorization à OAuth2
  • 53. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.53 What does it mean for me? •  Consider using SCIM for your internal environment -  Not just a cloud API •  SCIM is a good foundation for any REST API -  It can be used for more than just identities •  It’s easy to get started if you use the tools that are already available •  Use SCIM 1.1 for now -  Real-world adoption of SCIM 2.0 will happen in 2015
  • 54. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.54 References • Start here… - http://www.simplecloud.info/ •  Get involved here… -  http://www.ietf.org/mail-archive/web/scim/current/maillist.html •  All of the gory details here… -  http://datatracker.ietf.org/wg/scim/documents/ -  http://datatracker.ietf.org/doc/draft-ietf-scim-api/ -  http://datatracker.ietf.org/doc/draft-ietf-scim-core-schema/ •  Implementing a client or server in Java? Start here… -  https://www.unboundid.com/resources/scim/ •  Implementing a client or server in not Java? Start here… -  http://www.simplecloud.info/#implementations
  • 55. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.55 Questions kelly.grizzle@sailpoint.com @kelly_grizzle http://simplecloud.info