An Introduction to SCIM: System for Cross-Domain Identity Management



Similar documents
IETF 84 SCIM System for Cross-domain Identity Management. Kelly Grizzle

Cross-domain Identity Management System for Cloud Environment

Simple Cloud Identity Management (SCIM)

Interoperable Provisioning in a Distributed World

MY1LOGIN SOLUTION BRIEF: PROVISIONING. Automated Provisioning of Users Access to Apps

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

Interoperate in Cloud with Federation

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics

SAML and OAUTH comparison

NCSU SSO. Case Study

From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

The Primer: Nuts and Bolts of Federated Identity Management

Introduction to Directory Services

Integrating Single Sign-on Across the Cloud By David Strom

BYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity

Biometric Single Sign-on using SAML

Securing your business

vcloud Air Platform Programmer's Guide

Single Sign On. SSO & ID Management for Web and Mobile Applications

Biometric Single Sign-on using SAML Architecture & Design Strategies

The increasing popularity of mobile devices is rapidly changing how and where we

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

December 2014 Keywords/Summary

Connecting Users with Identity as a Service

A Standards-based Mobile Application IdM Architecture

Authentication Integration

Flexible Identity Federation

Extend and Enhance AD FS

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0

USING FEDERATED AUTHENTICATION WITH M-FILES

SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness

SAML Federated Identity at OASIS

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Copyright Pivotal Software Inc, of 10

Federated Identity and Single Sign-On using CA API Gateway

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

SAML:The Cross-Domain SSO Use Case

WebLogic Server 7.0 Single Sign-On: An Overview

Secure Identity in Cloud Computing

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Configuring User Identification via Active Directory

Apigee Gateway Specifications

Documentation. CloudAnywhere. Page 1

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

How To Use Salesforce Identity Features

Open Source Identity Management

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Mobile Security. Policies, Standards, Frameworks, Guidelines

Glinda Cummings World Wide Tivoli Security Product Manager

Service Provisioning Markup Language (SPML) Version 1.0

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

Gabriel Magariño. Software Engineer. Overview Revisited

Federated Identity Management Solutions

SAML SSO Configuration

OpenID Connect 1.0 for Enterprise

OpenID Deutsche telekom. Dr. Torsten Lodderstedt, Deutsche Telekom AG

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

SyncThru Database Migration

Cloud Managed Printing

Smartphone Enterprise Application Integration

Securing Web Services With SAML

Enterprise Access Control Patterns For REST and Web APIs

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

Using LDAP Authentication in a PowerCenter Domain

UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL SS. Single Sign-On (SSO) Solution

OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0

The Role of Identity Enabled Web Services in Cloud Computing

Cloud Security: Is It Safe To Go In Yet?

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Jitterbit Technical Overview : Microsoft Dynamics CRM

Axway API Gateway. Version 7.4.1

Federated Service Oriented Architecture for Effects-Based Operations

Portal Factory CMIS Connector Module documentation

SharePoint AD Information Sync Installation Instruction

Identity. Provide. ...to Office 365 & Beyond

Symantec Enterprise Vault.cloud Overview

Security As A Service Leveraged by Apache Projects. Oliver Wulff, Talend

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

Transcription:

An Introduction to SCIM: System for Cross-Domain Identity Management Nicholas Crown UnboundID Session ID: IAM-107A Session Classification: General Interest

Agenda Why Standards-Based Provisioning? History of Standards-Based Provisioning SCIM Overview 2

Why Standards-Based Provisioning? Need a standard way to create, read, update, and delete users (accounts) for both enterprise and consumer based digital identities In the enterprise, password management and compliance were big drivers Interoperability is the hardest part Different protocols and user schemas Provisioning connections are difficult to maintain and are fragile Application revisions can require engineering effort 3

History of Standards-Based Provisioning 2000 2001 2002 2003 2004 2005 2006 extensible Resource Provisioning Management (XRPM) Access360 (now IBM) OASIS Provisioning Services Technical Committee begins work on SPML v1 OASIS approves SPML v1 OASIS approves SPML v2 Active Digital Profile (ADPr) Business Layers (now CA) Information Technology Markup Language (ITML)- Account Provisioning Specification for Internet Business IBM proposes a competing standard WS-Provisioning; requirements fed into SPML v2 specification 4

SPML Adoption Adoption by application developers was low Implemented in most of the provisioning systems, but not one system is SPML conformant Application developers must build SPML-specific interfaces for each of the provisioning systems Support was more a "checkbox" item Few applications support SPML Not supported by popular SaaS applications Since the 2006 approval of SPML v2, activity in the OASIS PSTC was non-existent That is, until May of 2010 5

Genesis of SCIM Evolved from the Cloud Directory ( LDAP in the cloud ) WG spawned at the 2010 Cloud Identity Summit Founding participants include some of the largest SaaS providers: 6

Genesis of SCIM Cloud Service Providers (SaaS, etc.) are all feeling the user provisioning pain: How do I provision a user account for service X? How do I de-provision a user account from service X? How do I update an existing account for service X? How do I keep my organization s users in sync with service X? How do I manage groups? How is it done today? Manual (UI) Bulk (CSV upload) API SAML Just-In-Time provisioning 7

SCIM 8

History of SCIM 9

A Resource-Centric Model 10

Schema Origins in Portable Contacts (http://portablecontacts.net/) Rich Information Model XML and JSON data models Concrete artifacts (User and Group) Usage language (MTI and recommended) Extensibility: Inheritance and mix-in http://tools.ietf.org/html/draft-scim-core-schema-00.html 11

Example: User 12

Example: Ext User 13

Example: Group 14

Protocol Synchronous, HTTP, ReST CRUD + Search* + Discovery + Bulk* Simple MTI, Complex optional Extensible*, Versioned curl friendly http://tools.ietf.org/id/draft-scim-api-00.html 15

Operations Create = POST https://example.com/{v}/{resource} Read = GET https://example.com/{v}/{resource}/{id} Update = PUT https://example.com/{v}/{resource}/{id} Delete = DELETE https://example.com/{v}/{resource}/{id} *Update = PATCH https://example.com/{v}/{resource}/{id} *Search = https://example.com/{v}/{resource}?filter={attribute} {op} {value} & sortby={attributename} & sortorder={ascending descending} *Bulk 16

Create Request 17

Create Response 18

Security: Protocol Service provider Server-side SSL to authenticate to the consumer Also sets up session encryption Consumer Basic authentication (username and password) OK for testing OAuth higher identity assurance, at the expense of additional complexity X.509 (mutually-authenticated SSL) provides higher assurance, at the expense of additional complexity When tied to hardware, X.509 provides the highest identity assurance 19

Security: User 20

Within Scope CRUD operations for Users Groups Possibly other identity related objects (e.g. Devices) Bulk operations Protocol Binding for SAML, LDAP Extension semantics (schema & protocol) 21

Out of Scope Defining new authentication/authorization frameworks or mechanisms Defining access control mechanism or semantics Managing non-identity related resources 22

Current SCIM Topics Targeting Enables the same SCIM service to provision to multiple repositories Similar to the SPML provisioning service point and provisioning target Introduces additional complexity, particularly if the targets wish to share resource attributes externalid Make it optional Some customers may be looking at the service provider's ID attribute as the permanent user identifier 23

Applying SCIM What it Means for You Check out the draft specification on the IETF website and the open source implementations that are available today http://datatracker.ietf.org/wg/scim/ Evaluate how you are currently provisioning to cloud-based services Determine your current provisioning vendor s plan for supporting SCIM if any 24