SlideShare a Scribd company logo
SCIM in the
Real World
Kelly Grizzle
Software Architect – SailPoint
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.2
Overview
•  What is SCIM?
•  Trends in SCIM Usage
•  Who are you and what’s your problem?
-  Identity Gurus
-  Service Providers
•  Case Studies
•  Where is SCIM today and where is it going?
What is SCIM?
System for Cross-Domain
Identity Management
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.4
Identity Management
+
REST
=
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.5
Identity Management + REST = SCIM
•  REST is just architectural pattern
-  SCIM defines an identity management profile for it
•  SCIM provides…
-  Standard definitions for User and Group
-  Standard operations
•  Create, Read, Update, Delete, Search, Partial Update, Bulk
-  Extensibility
•  Add more attributes to existing object types or define new object
types
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.6
Example – Retrieve User Request
GET /Users/2819c223-7f76-453a-919d-413861904646
Host: example.com
Accept: application/scim+json
Authorization: Bearer h480djs93hd8
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.7
Example – Retrieve User Response
HTTP/1.1 200 OK
Content-Type: application/scim+json
Location: https://example.com/v2/Users/2819c223-7f76-453a-919d-413861904646
{
"schemas":["urn:ietf:params:scim:schemas:core:2.0:User"],
"id": "2819c223-7f76-453a-919d-413861904646",
"name": {
"formatted": "Ms. Barbara J Jensen III",
"familyName": "Jensen",
"givenName": "Barbara“
},
"meta": {
"resourceType": "User",
"created": "2011-08-01T18:29:49.793Z",
...
}
}
Self-describing
payload
Single-valued
attribute
Complex
attribute
Many
data types
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.8
CRUD Operations
POST /Users
PUT /Users/2819c223-7f76-453a-919d-413861904646
PATCH /Users/2819c223-7f76-453a-919d-413861904646
DELETE /Users/2819c223-7f76-453a-919d-413861904646
GET /Users?startIndex=10&count=5&filter=userName sw “J”
GET /Users/2819c223-7f76-453a-919d-413861904646
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.9
Server Configuration Operations
GET /ResourceTypes
-  Return the types of resources that are supported
-  Endpoint URL, schema, etc…
GET /Schemas/
-  Return the schema definitions
-  Attributes names and types, etc…
GET /ServiceProviderConfigs
-  Return info about what is supported by the server
-  Authn methods, optional features, etc…
Trends in SCIM
Usage
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.11
Trends
•  Enterprises are using SCIM Gateways to communicate
between internal systems
•  Service providers use SCIM for directory access
-  Store extended information, but often not visible externally
•  IAM and IDaaS vendors provide SCIM Servers to expose
identity information and use SCIM Clients to read/write
external systems
•  Common threads in custom password extensions
•  SCIM is seen as the identity management API
Who are you?
IAM Gurus!
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.14
99 problems and identity is #1
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.15
Problem!!! Bob needs a new account
SCIM Solution: Provision
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.16
Problem!!! Bob can’t login!
SCIM Solution: Password reset
* Alternate Solution: Single sign-on … but this isn’t a SAML / OIDC workshop.
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.17
Problem!!! Bob can’t read the financials
SCIM Solution: Add him to a group or
give him some entitlements
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.18
Problem!!! I need to know Bob’s access
SCIM Solution: Read User and Group Data
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.19
Problem!!! Bob has been a bad boy
SCIM Solution: Deprovision
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.20
Problem!! Apps team needs to r/w identity
SCIM Solution: Standard but extensible API
Case Study
Fortune 100 Chip
Maker
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.22
The Setup
•  Started considering options between a failed Oracle Identity
Manager project and “the next thing”
•  Needed a façade
-  Prevent IAM vendor lock-in
-  Needed co-existence between old and new IAM systems
•  Extensibility was crucial!
•  “We wanted a 20 year solution.” –IAM Guru
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.23
The Solution
Create a SCIM gateway to serve as a central identity hub
SCIM Gateway Cluster
Legacy Apps
IAM System SSO
Directory Server
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.24
The Interesting Parts
•  Extended user schema to hold custom information
•  Extended endpoints to support many additional features
-  Email verification
•  POST /EmailVerificationTokens to create a token
•  POST /EmailVerification to verify email using token
-  Password reset
•  POST /PasswordResetTokens to create a token
•  POST /PasswordChanges to change password using token
-  Security token management for SSO
•  POST /SecurityTokens to create authenticated session token
•  DELETE /SecurityTokens to invalidate
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.25
More Interesting Parts
•  More extended endpoints…
-  Notifications (email or SMS)
•  POST /Notifications to send a notification with user information merged in
(welcome email, forgot login ID, etc…)
-  Role management
•  PATCH /Roles to change membership for a role
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.26
The Benefits
•  Ability to add new information and features without breaking
existing clients
-  If there is anything in JSON that you don't recognize, throw it
away
“SCIM has been critical and program-saving. It is exactly what
we needed at exactly the right time, and fills a crucial role in
our environment."
--IAM Guru
Case Study
Fortune 500
Pharmaceuticals
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.28
The Setup
•  Need to support identity on a large portfolio of applications
-  Not all application teams are resourced equally
•  Wanted an abstraction of provisioning from specific
implementations
-  Allow for seamless upgrades of IAM system
-  Ease cost of implementation for smaller applications
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.29
The Solution
Create a SCIM gateway to serve as a central identity hub
SCIM SOA Gateway
On-prem Apps
IAM System Cloud Apps
Directory Server
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.30
The Benefits
•  SCIM gives agility in adopting new versions of IAM system
•  SCIM isolates IAM system if a SaaS vendor changes their
identity model
-  Connector continues to work with an updated schema
-  Important for SaaS vendors that can update at any time
•  If an application vendor is small it's not worth it to write a
custom connector
-  Small vendors are very willing to implement SCIM as their
standard identity API
Who are you?
Service
Providers!!
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.33
99 problems and identity is #1
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.34
Problem!!! I need to expose a directory!!
SCIM Solution: Read and write with SCIM
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.35
Problem!!! I need an API between my own
products!
SCIM Solution: Everything identity is SCIM
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.36
Problem!! My mobile app needs identities!
SCIM Solution: Light-weight REST API
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.37
Problem!!! I need to get identities from my
customer’s directory into my cloud app!
SCIM Solution: To the cloud with SCIM!
Case Study
Fortune 100
Networking
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.39
The Setup
•  Needed a consistent identity API that can be used:
-  By partners
-  By customers
-  Internally between products
-  To communicate with IdPs and other SaaS vendors
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.40
The Solution
SCIM Identity Service
Directory
Clients
Internal Systems
Partners &
IdPs
Identity
Sync Client
r/w r/w
Mobile Appr/w
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.41
The Interesting Parts
•  Additional endpoints
-  /Devices
-  /Tenants
•  Only available internally
•  Password policy is configured on tenant
•  Core schemas have been extended
-  Positive extensions: New attributes (mainly internal info)
-  Negative extensions: Attributes in SCIM spec that aren’t
supported
•  Legacy APIs forward requests on to SCIM
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.42
The Benefits
•  Single API for everything identity
•  Mobile application has a light-weight API to use
•  SCIM clients are easy to write
-  Have seen no need to write a toolkit
Case Study
Fortune 1000
Networking
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.44
The Setup
•  Needed a consistent identity API that can be used:
-  By customers
-  Internally between products
-  To communicate with IdPs
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.45
The Solution
SCIM Identity Service
Custom
Clients
Internal Systems IdPs
AD
Sync Client
r/w r/w
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.46
The Interesting Parts
•  Exploring an “organizational unit” extension to facility multi-
tenancy in API
•  Exploring a pub/sub SCIM model
-  Client subscribes to be notified of changes
-  SCIM server sends out notifications
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.47
The Benefits
•  Single API for everything identity
•  No need to provide documentation
-  Just point developers at the spec
•  Easy to implement
Case Studies
in brief
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.49
PaaS – CloudFoundry
•  CloudFoundry is an open platform-as-a-service (PaaS)
•  Identity APIs leverage standards
-  SCIM, OAuth2, and OpenID Connect
•  Benefits
-  Use existing open API rather than reinventing the wheel
-  Use SCIM extensions for some non-identity APIs
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.50
IDaaS and IAM Vendors
•  IDaaS and IAM vendors need to:
-  Allow external access to their identity store
-  Provision/read identities and groups to/from other applications
•  SCIM server provides external access
•  SCIM client provides provisioning to other applications
•  Benefits
-  Standardized API makes external integration easy
-  Applications that support SCIM can be integrated immediately
•  No custom connector is required
•  No product upgrade required to support new apps
SailPoint, Salesforce, Ping, VMWare, neXus, Oracle, UnboundID
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.51
Higher Education
•  Higher education is largely focused on federation
-  Need to propagate minimum amount of identity data
-  Authorization data (group memberships) are very important
-  Federation attribute payload works well for Just In Time (JIT)
provisioning
-  SCIM enables more robust record propagation when JIT is not
good enough
•  For example, email account provisioning often must occur before
first login
Federations that need attribute exchange
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.52
Higher Education
•  VOOT is an identity/group protocol built on top of SCIM
-  Adds more features around group membership
•  Grouper is a user/group management tool developed by
Internet2
-  SCIM integration allows writing to down-stream endpoints
http://openvoot.org/
https://spaces.internet2.edu/display/Grouper/Grouper+SCIM+Integration
VOOT and Grouper
Case Study
neXus
Internet of Things
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.54
The Setup
•  IoT provider needed:
-  A registry of devices associated with a user
-  Information about the device (bluetooth address, etc…)
-  A mobile app that can
•  Authenticate
•  Retrieve user information (including devices)
•  Communicate with devices
-  Devices that can send status updates
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.55
The Solution
SCIM Server
Mobile App
GET /me
(as authenticated user)
{
“id”: “89723-83703”,
“devices”: [{
“name”: “Tesla”,
“bluetoothAddress”: “000A3A58F310”,
“deviceType”: “electricCar”,
“batteryLife”: 58,
…
},
…
}
Bluetooth
Start A/C
PATCH /Cars/89723-83703
{
“batteryLife”: 57,
“location”: {
“lat”: 30.4045541,
“long”: -97.8489572
}
}
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.56
The Benefits
•  Extended user schema to show which devices belong to
each user
•  New endpoints for devices to read/write device information
-  Example: /Cars, /Vacuums
•  Extensible schema allows new device types to be imported
via JSON files
•  Extremely light-weight SCIM clients on mobile app and
devices
-  This is very important for constrained devices
Where is SCIM?
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.58
Current Status
•  2.0 API, Core Schema, and Use Cases docs are complete
-  Will become official RFCs in the next couple months
•  IETF working group will continue to work on SCIM
extensions
-  Passwords: http://datatracker.ietf.org/doc/draft-hunt-scim-password-mgmt/
-  Notify: http://datatracker.ietf.org/doc/draft-hunt-scim-notify/
-  Soft Delete: http://datatracker.ietf.org/doc/draft-ansari-scim-soft-delete/
-  Others TBD
Wrapping it up…
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.61
Adoption is growing…
“The SCIM interface will have parity other APIs and will be a
first-class citizen.”
--Ian Glazer, Salesforce
“I’m also proud to say Oracle’s Amit Jasuja announced at last
year’s OpenWorld that Oracle IDM’s key REST API for
Identity will be SCIM…”
--Phil Hunt, Oracle
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.62
Adoption is growing…
“SCIM works perfectly for constrained devices.”
--Erik Wahlström, neXus
“SCIM is simple to implement.”
--Haavar Valeur, Citrix
Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.63
Questions
kelly.grizzle@sailpoint.com
@kelly_grizzle
http://simplecloud.info

More Related Content

What's hot

Solaris 11.4 launch
Solaris 11.4 launchSolaris 11.4 launch
Solaris 11.4 launch
Scott Lynn
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
IBM Sverige
 
Comparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managersComparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managersInfraMatix Inc.
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway
 
IBM Sotware Subscription and Support
IBM Sotware Subscription and SupportIBM Sotware Subscription and Support
IBM Sotware Subscription and Support
Stefan Pasinsky
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
Hitachi ID Systems, Inc.
 
Deployment Automation for Hybrid Cloud and Multi-Platform Environments
Deployment Automation for Hybrid Cloud and Multi-Platform EnvironmentsDeployment Automation for Hybrid Cloud and Multi-Platform Environments
Deployment Automation for Hybrid Cloud and Multi-Platform Environments
IBM UrbanCode Products
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
Ibm pure systems pov_idr_spig_v1
Ibm pure systems pov_idr_spig_v1Ibm pure systems pov_idr_spig_v1
Ibm pure systems pov_idr_spig_v1
Marco Laucelli
 
Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45
Sarah Duffy
 
Forefront Identity Manager
Forefront Identity ManagerForefront Identity Manager
Forefront Identity Manager
MASIT MACEDONIA
 
Katpro general portfolio - industry based
Katpro general portfolio - industry basedKatpro general portfolio - industry based
Katpro general portfolio - industry based
Katpro Technologies Pvt Ltd
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
Novell
 
Open day competenze digitali boverino v-mware intro
Open day competenze digitali   boverino v-mware introOpen day competenze digitali   boverino v-mware intro
Open day competenze digitali boverino v-mware intro
Redazione InnovaPuglia
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetindradipg
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
IBM Security
 

What's hot (20)

Solaris 11.4 launch
Solaris 11.4 launchSolaris 11.4 launch
Solaris 11.4 launch
 
Cloud, agile
Cloud, agileCloud, agile
Cloud, agile
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Comparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managersComparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managers
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use Cases
 
IBM Sotware Subscription and Support
IBM Sotware Subscription and SupportIBM Sotware Subscription and Support
IBM Sotware Subscription and Support
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Deployment Automation for Hybrid Cloud and Multi-Platform Environments
Deployment Automation for Hybrid Cloud and Multi-Platform EnvironmentsDeployment Automation for Hybrid Cloud and Multi-Platform Environments
Deployment Automation for Hybrid Cloud and Multi-Platform Environments
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Ibm pure systems pov_idr_spig_v1
Ibm pure systems pov_idr_spig_v1Ibm pure systems pov_idr_spig_v1
Ibm pure systems pov_idr_spig_v1
 
Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45
 
Forefront Identity Manager
Forefront Identity ManagerForefront Identity Manager
Forefront Identity Manager
 
Katpro general portfolio - industry based
Katpro general portfolio - industry basedKatpro general portfolio - industry based
Katpro general portfolio - industry based
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Open day competenze digitali boverino v-mware intro
Open day competenze digitali   boverino v-mware introOpen day competenze digitali   boverino v-mware intro
Open day competenze digitali boverino v-mware intro
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
Centrify Intellect event
Centrify   Intellect eventCentrify   Intellect event
Centrify Intellect event
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 

Similar to CIS 2015 SCIM in the Real World - Kelly Grizzle

Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0
Kelly Grizzle
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
Kelly Grizzle
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CloudIDSummit
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
Hitachi ID Systems, Inc.
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
Hitachi ID Systems, Inc.
 
Which One Works You The Best: In-House or Cloud-Based Development Environment
Which One Works You The Best: In-House or Cloud-Based Development EnvironmentWhich One Works You The Best: In-House or Cloud-Based Development Environment
Which One Works You The Best: In-House or Cloud-Based Development Environment
Bitbar
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
ForgeRock
 
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
Emtec Inc.
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Systems, Inc.
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
Perficient, Inc.
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
ForgeRock
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Sara Barbosa
 
MuleSoft Meetup Charlotte 2019
MuleSoft Meetup Charlotte  2019MuleSoft Meetup Charlotte  2019
MuleSoft Meetup Charlotte 2019
Subhash Patel
 
The Changing Role of IT: From Service Managers to Advisors
The Changing Role of IT:From Service Managers to AdvisorsThe Changing Role of IT:From Service Managers to Advisors
The Changing Role of IT: From Service Managers to Advisors
Jesse Stockall
 
Enterprise Security: Tableau vs. Power BI
Enterprise Security: Tableau vs. Power BIEnterprise Security: Tableau vs. Power BI
Enterprise Security: Tableau vs. Power BI
Senturus
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
Hitachi ID Systems, Inc.
 
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Amazon Web Services
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
Imperva
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
DianaGray10
 

Similar to CIS 2015 SCIM in the Real World - Kelly Grizzle (20)

Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Which One Works You The Best: In-House or Cloud-Based Development Environment
Which One Works You The Best: In-House or Cloud-Based Development EnvironmentWhich One Works You The Best: In-House or Cloud-Based Development Environment
Which One Works You The Best: In-House or Cloud-Based Development Environment
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
 
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...
 
MuleSoft Meetup Charlotte 2019
MuleSoft Meetup Charlotte  2019MuleSoft Meetup Charlotte  2019
MuleSoft Meetup Charlotte 2019
 
The Changing Role of IT: From Service Managers to Advisors
The Changing Role of IT:From Service Managers to AdvisorsThe Changing Role of IT:From Service Managers to Advisors
The Changing Role of IT: From Service Managers to Advisors
 
Enterprise Security: Tableau vs. Power BI
Enterprise Security: Tableau vs. Power BIEnterprise Security: Tableau vs. Power BI
Enterprise Security: Tableau vs. Power BI
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
CloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

CIS 2015 SCIM in the Real World - Kelly Grizzle

  • 1. SCIM in the Real World Kelly Grizzle Software Architect – SailPoint
  • 2. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.2 Overview •  What is SCIM? •  Trends in SCIM Usage •  Who are you and what’s your problem? -  Identity Gurus -  Service Providers •  Case Studies •  Where is SCIM today and where is it going?
  • 3. What is SCIM? System for Cross-Domain Identity Management
  • 4. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.4 Identity Management + REST =
  • 5. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.5 Identity Management + REST = SCIM •  REST is just architectural pattern -  SCIM defines an identity management profile for it •  SCIM provides… -  Standard definitions for User and Group -  Standard operations •  Create, Read, Update, Delete, Search, Partial Update, Bulk -  Extensibility •  Add more attributes to existing object types or define new object types
  • 6. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.6 Example – Retrieve User Request GET /Users/2819c223-7f76-453a-919d-413861904646 Host: example.com Accept: application/scim+json Authorization: Bearer h480djs93hd8
  • 7. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.7 Example – Retrieve User Response HTTP/1.1 200 OK Content-Type: application/scim+json Location: https://example.com/v2/Users/2819c223-7f76-453a-919d-413861904646 { "schemas":["urn:ietf:params:scim:schemas:core:2.0:User"], "id": "2819c223-7f76-453a-919d-413861904646", "name": { "formatted": "Ms. Barbara J Jensen III", "familyName": "Jensen", "givenName": "Barbara“ }, "meta": { "resourceType": "User", "created": "2011-08-01T18:29:49.793Z", ... } } Self-describing payload Single-valued attribute Complex attribute Many data types
  • 8. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.8 CRUD Operations POST /Users PUT /Users/2819c223-7f76-453a-919d-413861904646 PATCH /Users/2819c223-7f76-453a-919d-413861904646 DELETE /Users/2819c223-7f76-453a-919d-413861904646 GET /Users?startIndex=10&count=5&filter=userName sw “J” GET /Users/2819c223-7f76-453a-919d-413861904646
  • 9. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.9 Server Configuration Operations GET /ResourceTypes -  Return the types of resources that are supported -  Endpoint URL, schema, etc… GET /Schemas/ -  Return the schema definitions -  Attributes names and types, etc… GET /ServiceProviderConfigs -  Return info about what is supported by the server -  Authn methods, optional features, etc…
  • 11. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.11 Trends •  Enterprises are using SCIM Gateways to communicate between internal systems •  Service providers use SCIM for directory access -  Store extended information, but often not visible externally •  IAM and IDaaS vendors provide SCIM Servers to expose identity information and use SCIM Clients to read/write external systems •  Common threads in custom password extensions •  SCIM is seen as the identity management API
  • 14. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.14 99 problems and identity is #1
  • 15. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.15 Problem!!! Bob needs a new account SCIM Solution: Provision
  • 16. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.16 Problem!!! Bob can’t login! SCIM Solution: Password reset * Alternate Solution: Single sign-on … but this isn’t a SAML / OIDC workshop.
  • 17. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.17 Problem!!! Bob can’t read the financials SCIM Solution: Add him to a group or give him some entitlements
  • 18. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.18 Problem!!! I need to know Bob’s access SCIM Solution: Read User and Group Data
  • 19. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.19 Problem!!! Bob has been a bad boy SCIM Solution: Deprovision
  • 20. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.20 Problem!! Apps team needs to r/w identity SCIM Solution: Standard but extensible API
  • 22. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.22 The Setup •  Started considering options between a failed Oracle Identity Manager project and “the next thing” •  Needed a façade -  Prevent IAM vendor lock-in -  Needed co-existence between old and new IAM systems •  Extensibility was crucial! •  “We wanted a 20 year solution.” –IAM Guru
  • 23. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.23 The Solution Create a SCIM gateway to serve as a central identity hub SCIM Gateway Cluster Legacy Apps IAM System SSO Directory Server
  • 24. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.24 The Interesting Parts •  Extended user schema to hold custom information •  Extended endpoints to support many additional features -  Email verification •  POST /EmailVerificationTokens to create a token •  POST /EmailVerification to verify email using token -  Password reset •  POST /PasswordResetTokens to create a token •  POST /PasswordChanges to change password using token -  Security token management for SSO •  POST /SecurityTokens to create authenticated session token •  DELETE /SecurityTokens to invalidate
  • 25. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.25 More Interesting Parts •  More extended endpoints… -  Notifications (email or SMS) •  POST /Notifications to send a notification with user information merged in (welcome email, forgot login ID, etc…) -  Role management •  PATCH /Roles to change membership for a role
  • 26. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.26 The Benefits •  Ability to add new information and features without breaking existing clients -  If there is anything in JSON that you don't recognize, throw it away “SCIM has been critical and program-saving. It is exactly what we needed at exactly the right time, and fills a crucial role in our environment." --IAM Guru
  • 28. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.28 The Setup •  Need to support identity on a large portfolio of applications -  Not all application teams are resourced equally •  Wanted an abstraction of provisioning from specific implementations -  Allow for seamless upgrades of IAM system -  Ease cost of implementation for smaller applications
  • 29. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.29 The Solution Create a SCIM gateway to serve as a central identity hub SCIM SOA Gateway On-prem Apps IAM System Cloud Apps Directory Server
  • 30. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.30 The Benefits •  SCIM gives agility in adopting new versions of IAM system •  SCIM isolates IAM system if a SaaS vendor changes their identity model -  Connector continues to work with an updated schema -  Important for SaaS vendors that can update at any time •  If an application vendor is small it's not worth it to write a custom connector -  Small vendors are very willing to implement SCIM as their standard identity API
  • 33. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.33 99 problems and identity is #1
  • 34. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.34 Problem!!! I need to expose a directory!! SCIM Solution: Read and write with SCIM
  • 35. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.35 Problem!!! I need an API between my own products! SCIM Solution: Everything identity is SCIM
  • 36. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.36 Problem!! My mobile app needs identities! SCIM Solution: Light-weight REST API
  • 37. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.37 Problem!!! I need to get identities from my customer’s directory into my cloud app! SCIM Solution: To the cloud with SCIM!
  • 39. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.39 The Setup •  Needed a consistent identity API that can be used: -  By partners -  By customers -  Internally between products -  To communicate with IdPs and other SaaS vendors
  • 40. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.40 The Solution SCIM Identity Service Directory Clients Internal Systems Partners & IdPs Identity Sync Client r/w r/w Mobile Appr/w
  • 41. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.41 The Interesting Parts •  Additional endpoints -  /Devices -  /Tenants •  Only available internally •  Password policy is configured on tenant •  Core schemas have been extended -  Positive extensions: New attributes (mainly internal info) -  Negative extensions: Attributes in SCIM spec that aren’t supported •  Legacy APIs forward requests on to SCIM
  • 42. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.42 The Benefits •  Single API for everything identity •  Mobile application has a light-weight API to use •  SCIM clients are easy to write -  Have seen no need to write a toolkit
  • 44. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.44 The Setup •  Needed a consistent identity API that can be used: -  By customers -  Internally between products -  To communicate with IdPs
  • 45. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.45 The Solution SCIM Identity Service Custom Clients Internal Systems IdPs AD Sync Client r/w r/w
  • 46. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.46 The Interesting Parts •  Exploring an “organizational unit” extension to facility multi- tenancy in API •  Exploring a pub/sub SCIM model -  Client subscribes to be notified of changes -  SCIM server sends out notifications
  • 47. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.47 The Benefits •  Single API for everything identity •  No need to provide documentation -  Just point developers at the spec •  Easy to implement
  • 49. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.49 PaaS – CloudFoundry •  CloudFoundry is an open platform-as-a-service (PaaS) •  Identity APIs leverage standards -  SCIM, OAuth2, and OpenID Connect •  Benefits -  Use existing open API rather than reinventing the wheel -  Use SCIM extensions for some non-identity APIs
  • 50. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.50 IDaaS and IAM Vendors •  IDaaS and IAM vendors need to: -  Allow external access to their identity store -  Provision/read identities and groups to/from other applications •  SCIM server provides external access •  SCIM client provides provisioning to other applications •  Benefits -  Standardized API makes external integration easy -  Applications that support SCIM can be integrated immediately •  No custom connector is required •  No product upgrade required to support new apps SailPoint, Salesforce, Ping, VMWare, neXus, Oracle, UnboundID
  • 51. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.51 Higher Education •  Higher education is largely focused on federation -  Need to propagate minimum amount of identity data -  Authorization data (group memberships) are very important -  Federation attribute payload works well for Just In Time (JIT) provisioning -  SCIM enables more robust record propagation when JIT is not good enough •  For example, email account provisioning often must occur before first login Federations that need attribute exchange
  • 52. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.52 Higher Education •  VOOT is an identity/group protocol built on top of SCIM -  Adds more features around group membership •  Grouper is a user/group management tool developed by Internet2 -  SCIM integration allows writing to down-stream endpoints http://openvoot.org/ https://spaces.internet2.edu/display/Grouper/Grouper+SCIM+Integration VOOT and Grouper
  • 54. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.54 The Setup •  IoT provider needed: -  A registry of devices associated with a user -  Information about the device (bluetooth address, etc…) -  A mobile app that can •  Authenticate •  Retrieve user information (including devices) •  Communicate with devices -  Devices that can send status updates
  • 55. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.55 The Solution SCIM Server Mobile App GET /me (as authenticated user) { “id”: “89723-83703”, “devices”: [{ “name”: “Tesla”, “bluetoothAddress”: “000A3A58F310”, “deviceType”: “electricCar”, “batteryLife”: 58, … }, … } Bluetooth Start A/C PATCH /Cars/89723-83703 { “batteryLife”: 57, “location”: { “lat”: 30.4045541, “long”: -97.8489572 } }
  • 56. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.56 The Benefits •  Extended user schema to show which devices belong to each user •  New endpoints for devices to read/write device information -  Example: /Cars, /Vacuums •  Extensible schema allows new device types to be imported via JSON files •  Extremely light-weight SCIM clients on mobile app and devices -  This is very important for constrained devices
  • 58. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.58 Current Status •  2.0 API, Core Schema, and Use Cases docs are complete -  Will become official RFCs in the next couple months •  IETF working group will continue to work on SCIM extensions -  Passwords: http://datatracker.ietf.org/doc/draft-hunt-scim-password-mgmt/ -  Notify: http://datatracker.ietf.org/doc/draft-hunt-scim-notify/ -  Soft Delete: http://datatracker.ietf.org/doc/draft-ansari-scim-soft-delete/ -  Others TBD
  • 60.
  • 61. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.61 Adoption is growing… “The SCIM interface will have parity other APIs and will be a first-class citizen.” --Ian Glazer, Salesforce “I’m also proud to say Oracle’s Amit Jasuja announced at last year’s OpenWorld that Oracle IDM’s key REST API for Identity will be SCIM…” --Phil Hunt, Oracle
  • 62. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.62 Adoption is growing… “SCIM works perfectly for constrained devices.” --Erik Wahlström, neXus “SCIM is simple to implement.” --Haavar Valeur, Citrix
  • 63. Copyright © SailPoint Technologies, Inc. 2015 All rights reserved.63 Questions kelly.grizzle@sailpoint.com @kelly_grizzle http://simplecloud.info