SlideShare a Scribd company logo
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
IDENTITY SOUFFLE
CREATING A WELL-BAKED IDENTITY LIFECYCLE
Pamela Dingle
@pamelarosiedee
Office of the CTO, Ping Identity
•  Heckler Policy
•  Platitudes
•  Meal Plan
•  Pantry Management (data at
rest)
•  Shopping – (data movement)
•  Kitchen Techniques (handling
data)
Agenda
This track is about breadth not depth
What does it mean to Manage Identities
•  Before you can chop
•  Before you can bake
•  Before you can serve
•  You need to know what
you’re trying to make
•  You have to have the right
ingredients in your pantry
Preparation is the key – Identity is State
“I” comes before “A” in IAM
1.  Create and maintain an
accurate picture of the
people, policies, and
resources in your
Enterprise
2.  Leverage that state to
protect and enable
Identity like Cooking is GIGO (garbage in, garbage out)
•  You can have the best
security in the world
– But it won’t help you if
decisions are based on
outdated identity
information
Review the Meal Plan Attribution: Daniel Headrick, G
Pantry Management : Identity Lifecycle
•  Accurate, timely knowledge of who and what constitutes your
Enterprise
–  Every system needs the right set of data in its reach
•  Accounts
•  Resources
•  Policies
–  Data must change everywhere when it is changed at the
authoritative source
•  You know you’re doing it wrong when
–  Your SOX audit finds dead people in application databases
–  It takes 5 days for a new hire to get access to applications
–  A fired employee can walk to Starbucks and download critical
business info from cloud applications
–  An employee has to chase a 100 application admins to change
their name
The Units of User Identity Lifecycle
•  Account
–  A relationship between a user and a
system
•  Identifier
–  Unique keys or “handles” for accounts
•  Username
•  GUID
•  Attribute
–  Distinct piece of information
•  Often a name/value pair
•  Values can be complex
•  Aka: Claim
•  Eg:
–  Name: Pamela
•  Where does data originate?
•  Where should it change?
•  What systems should also
change when authoritative
systems change?
•  Note this only shows data
replication, not the tools that
do the detecting or moving
•  Principle: SSOT or DRY
Track Data Relationship
Start by looking at Data at Rest
SOR HR System
Authoritative for: Account Status
name
department
employee#
Repo: Active Directory
Authoritative for: Identifier
email
groups
password
SOR: Social Networks
Authoritative for: Login Credential
nickname
Repo: MySQL
Authoritative for: Identifier
roles
enrollment date
Internal Apps
Internal APIs
Attribute Provider:
Billing System
Authoritative for: current plan
$$ spent
plan expiry
CC number
Sales Rep
Cloud Apps
Identifiers
•  Identifiers have a scope
–  Not every identifier is globally unique
–  Not every identifier has to be human readable
–  Identifiers can co-exist
•  Advice: standardize one “login id”
–  Best usability for users
–  Federation systems help here
•  Can map user-known id to system-known id
–  Maps may need to be maintained
Accounts
•  Presence/Status of Account is a preliminary access gate
•  When access is needed, pressure to create account is high
–  When access is discarded, no such pressure exists
•  Many [cloud] apps refuse to delete accounts
–  Only disable them
–  Discrepancies can cause havoc
–  Advice: create an identifier recycling plan
•  Hire John Smith (jsmith) & propagate accounts
•  Fire John Smith and hire Jane smith (jsmith)
Attributes
•  User attributes
–  Have an authoritative source
•  Can be self-asserted
–  Source is the identity owner
•  Can be “verified”
–  Source is authoritative and accountable
–  Some attributes are perishable
•  Name infrequently changes
•  Roles frequently change
•  Birthdate never changes
•  Credit rating should be fetched every time
•  Advice: standardize attribute name and format
where possible across systems (eg: date)
Pantry Staple: Directories
•  Directories are specialized
account and attribute
repositories
–  Meant to be used by multiple
applications
–  Highly fault tolerant and
distributed
–  Designed to be hierarchically
accessible via a standard
protocol: LDAP
So you think you know how to Stock the Pantry.
•  What’s next?
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
Provisioning!
•  Process of getting the right
information to the right
systems at the right time
– CRUD: create, replace, update,
delete based on events
•  Advice: automation reduces risk
Provisioning
•  Pushing accounts and attributes shouldn’t be hard
–  But it is. Many application vendors figure an admin console is
good enough.
•  Common options:
–  Batch (CSV/LDIF)
–  Backend database manipulation (not possible for cloud)
–  Provisioning API
–  SCIM
–  JIT Provisioning
Base elements of a provisioning architecture
•  Process
–  HR adds a new user via admin console
–  Manager requests a promotion for an
employee
–  Customer updates their self-service profile
•  Trigger
•  Attribute or account change detected in AD
•  Help Desk ticket triggers API call to a service
•  Business logic executes on data save
•  Admin gets an email
•  Fulfillment
–  Database row inserted
–  SCIM call made
Provisioning Map
•  Process,Trigger,
and Fulfillment
may all be
managed by
different people
•  A single process
often causes
multiple triggers
and fulfillments
SOR HR System
Authoritative for: Account Status
name
department
employee#
Repo: Active Directory
Authoritative for: Identifier
email
groups
password
SOR: Social Networks
Authoritative for: Login Credential
nickname
Repo: MySQL
Authoritative for: Identifier
roles
enrollment date
Internal Apps
Internal APIs
Attribute Provider:
Billing System
Authoritative for: current plan
$$ spent
plan expiry
CC number
Sales Rep
Cloud Apps
P:Admin App Interface
T: New DB Entry
F: LDAP insert T: New AD Entry
F: DB insert
T: New AD Entry
F: DB insert
T: New AD Entry
F: SCIM create
P: Self Service
T:API CAll
F: DB Delete
T: DB delete
F: SCIM delete
T: DB delete
F: DB delete
T: DB update
F:API call
T: DB delete
F: DB delete
Repo: Oracle
Authoritative for: Scopes
Access Tokens
T: DB delete
F:API Call token wipe
T: DB delete
F:API Call token wipe
T: DB delete
F: DB delete
Provisioning Solutions
•  Provisioning world is a mess
–  Old school provisioning about bypassing
the app
–  No pressure was ever put on vendors
•  Provisioning to the cloud cannot happen
without cooperation by cloud
application vendors
–  Many have no provisioning API
–  Others have proprietary provisioning
APIs
•  Which means provisioning efforts are
unique snowflakes
–  Best hope for the future is SCIM
SCIM
•  System for Cross-Domain Identity
•  It’s just a User Management REST API
–  That works the same way everywhere
•  Ingredients:
–  Users REST endpoint (minimum)
–  Basic Auth creds
•  or better yet, an OAuth access token
–  Create, delete, modify users on somebody else’s platform
HTTP Create to User Endpoint
{
"schemas":
[
"urn:scim:schemas:core:1.0”
],
"externalId":"bjensen”,
"userName":"bjensen",
"name”:
{
"familyName":"Jensen",
"givenName":"Barbara”
},
"emails":
[
{"value":bjensen@babs.com,"type":"work"}
]
}
JSON Returned
{
"userName":"bjensen",
"name”:
{
"familyName":"Jensen",
"givenName":"Barbara”
},
"userType":"basicUser",
"emails":
[
{"value":"bjensen@babs.com","type":"work"}
],
"meta":
{
"lastModified":"2014-06-23T22:56:07.263Z",
"created":"2014-06-23T22:56:07.263Z",
"location":https://gold.pinglabs.net:9031/pf-scim/v1/Users/29166
},
"id":"29166",
"schemas":["urn:scim:schemas:core:1.0"]
}
Just in Time Provisioning
•  Just in Time Provisioning is extremely useful for
customer systems
– System of Record is the Federation Server
– User created in application database the second a
SAML assertion arrives from an authoritative source
– Note: JIT provisioning often doesn’t handle de-prov
Provisioning Architecture
SOR HR System
Authoritative for: Account Status
name
department
employee#
Repo: Active Directory
Authoritative for: Identifier
email
groups
password
SOR: Social Networks
Authoritative for: Login Credential
nickname
Repo: MySQL
Authoritative for: Identifier
roles
enrollment date
Internal Apps
Internal APIs
Attribute Provider:
Billing System
Authoritative for: current plan
$$ spent
plan expiry
CC number
Sales Rep
Cloud Apps
F: DB insert
F: DB insert
T: New AD Entry
P: Self Service
T:API CAll
F: DB Delete
T: DB delete
F: SCIM delete
F: DB delete
T: DB delete
F: DB delete
Repo: Oracle
Authoritative for: Scopes
Access Tokens
T: DB delete
F:API Call token wipe
F:API Call token wipe
F: DB delete
Provisioning
System
F: SCIM create
F:API call
T: DB delete
P:Admin App Interface
T: New DB Entry
F: LDAP insert
Data Ownership & Provenance
•  Other issues you need to think of
–  Who owns the data?
•  Is consent needed to use or move the data?
–  Jurisdiction
•  Where was the data inputted and where can it legally go?
–  Governance
•  Can you prove that the system worked the way you mapped it
•  SOX Attestation
Identities in the Cloud
•  How do you redraw your map when your users live in
the cloud?
–  Architecture becomes fully API & federation driven
–  IDaaS creates a “cloud platform” for user identities
•  Processes are either part of the IDaaS Service or integrated via
API
–  The business must start to see itself as a service provider
Thanks!
@pamelarosiedee
http://pingidentity.com
http://eternallyoptimistic.com

More Related Content

PDF
CIS13: IDaaS. The Now Big Thing
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS13: Deliver Secure Apps with Great Experiences
PDF
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
PDF
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
PDF
The Case For Next Generation IAM
PPTX
Identity and Access Management (IAM)
PPTX
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
CIS13: IDaaS. The Now Big Thing
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS13: Deliver Secure Apps with Great Experiences
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Case For Next Generation IAM
Identity and Access Management (IAM)
IAM Methods 2.0 Presentation Michael Nielsen Deloitte

Similar to CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle (20)

PDF
CIS14: Identity at Scale: Building from the Ground Up
PDF
End-to-End Identity Management
PDF
Reducing the Chance of an Office 365 Security Breach
PDF
Five Things You Gotta Know About Modern Identity
PDF
Identity and Access Management 101
PDF
Getting to Flow You: A First Date with Flow Builder
PDF
Cloud identity management meetup 150108
PDF
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
PDF
CIS14: How I Came to Share Signals and Learned to Love my Identity System
PPTX
Stop treating your customers like your employees
PPTX
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
PPTX
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
PDF
Dell active roles
PDF
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
PDF
Compliance & Identity access management
PDF
Trusting External Identity Providers for Global Research Collaborations
PDF
Human Resources & IT: A Marriage Made in Heaven?
PDF
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
PDF
Introduction to Identity Management
PPTX
TACOM 2014: Back To Basics
CIS14: Identity at Scale: Building from the Ground Up
End-to-End Identity Management
Reducing the Chance of an Office 365 Security Breach
Five Things You Gotta Know About Modern Identity
Identity and Access Management 101
Getting to Flow You: A First Date with Flow Builder
Cloud identity management meetup 150108
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
CIS14: How I Came to Share Signals and Learned to Love my Identity System
Stop treating your customers like your employees
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
Dell active roles
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
Compliance & Identity access management
Trusting External Identity Providers for Global Research Collaborations
Human Resources & IT: A Marriage Made in Heaven?
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
Introduction to Identity Management
TACOM 2014: Back To Basics
Ad

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
PDF
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 The Ethics of Personal Data - Robin Wilton
Ad

Recently uploaded (20)

PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
STKI Israel Market Study 2025 version august
PPT
What is a Computer? Input Devices /output devices
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
August Patch Tuesday
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Getting Started with Data Integration: FME Form 101
O2C Customer Invoices to Receipt V15A.pptx
STKI Israel Market Study 2025 version august
What is a Computer? Input Devices /output devices
A novel scalable deep ensemble learning framework for big data classification...
NewMind AI Weekly Chronicles - August'25-Week II
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
August Patch Tuesday
Group 1 Presentation -Planning and Decision Making .pptx
DP Operators-handbook-extract for the Mautical Institute
Hindi spoken digit analysis for native and non-native speakers
WOOl fibre morphology and structure.pdf for textiles
observCloud-Native Containerability and monitoring.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Getting started with AI Agents and Multi-Agent Systems
Web App vs Mobile App What Should You Build First.pdf
Hybrid model detection and classification of lung cancer
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Getting Started with Data Integration: FME Form 101

CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle

  • 2. IDENTITY SOUFFLE CREATING A WELL-BAKED IDENTITY LIFECYCLE Pamela Dingle @pamelarosiedee Office of the CTO, Ping Identity
  • 3. •  Heckler Policy •  Platitudes •  Meal Plan •  Pantry Management (data at rest) •  Shopping – (data movement) •  Kitchen Techniques (handling data) Agenda
  • 4. This track is about breadth not depth
  • 5. What does it mean to Manage Identities •  Before you can chop •  Before you can bake •  Before you can serve •  You need to know what you’re trying to make •  You have to have the right ingredients in your pantry
  • 6. Preparation is the key – Identity is State “I” comes before “A” in IAM 1.  Create and maintain an accurate picture of the people, policies, and resources in your Enterprise 2.  Leverage that state to protect and enable
  • 7. Identity like Cooking is GIGO (garbage in, garbage out) •  You can have the best security in the world – But it won’t help you if decisions are based on outdated identity information
  • 8. Review the Meal Plan Attribution: Daniel Headrick, G
  • 9. Pantry Management : Identity Lifecycle •  Accurate, timely knowledge of who and what constitutes your Enterprise –  Every system needs the right set of data in its reach •  Accounts •  Resources •  Policies –  Data must change everywhere when it is changed at the authoritative source •  You know you’re doing it wrong when –  Your SOX audit finds dead people in application databases –  It takes 5 days for a new hire to get access to applications –  A fired employee can walk to Starbucks and download critical business info from cloud applications –  An employee has to chase a 100 application admins to change their name
  • 10. The Units of User Identity Lifecycle •  Account –  A relationship between a user and a system •  Identifier –  Unique keys or “handles” for accounts •  Username •  GUID •  Attribute –  Distinct piece of information •  Often a name/value pair •  Values can be complex •  Aka: Claim •  Eg: –  Name: Pamela
  • 11. •  Where does data originate? •  Where should it change? •  What systems should also change when authoritative systems change? •  Note this only shows data replication, not the tools that do the detecting or moving •  Principle: SSOT or DRY Track Data Relationship Start by looking at Data at Rest SOR HR System Authoritative for: Account Status name department employee# Repo: Active Directory Authoritative for: Identifier email groups password SOR: Social Networks Authoritative for: Login Credential nickname Repo: MySQL Authoritative for: Identifier roles enrollment date Internal Apps Internal APIs Attribute Provider: Billing System Authoritative for: current plan $$ spent plan expiry CC number Sales Rep Cloud Apps
  • 12. Identifiers •  Identifiers have a scope –  Not every identifier is globally unique –  Not every identifier has to be human readable –  Identifiers can co-exist •  Advice: standardize one “login id” –  Best usability for users –  Federation systems help here •  Can map user-known id to system-known id –  Maps may need to be maintained
  • 13. Accounts •  Presence/Status of Account is a preliminary access gate •  When access is needed, pressure to create account is high –  When access is discarded, no such pressure exists •  Many [cloud] apps refuse to delete accounts –  Only disable them –  Discrepancies can cause havoc –  Advice: create an identifier recycling plan •  Hire John Smith (jsmith) & propagate accounts •  Fire John Smith and hire Jane smith (jsmith)
  • 14. Attributes •  User attributes –  Have an authoritative source •  Can be self-asserted –  Source is the identity owner •  Can be “verified” –  Source is authoritative and accountable –  Some attributes are perishable •  Name infrequently changes •  Roles frequently change •  Birthdate never changes •  Credit rating should be fetched every time •  Advice: standardize attribute name and format where possible across systems (eg: date)
  • 15. Pantry Staple: Directories •  Directories are specialized account and attribute repositories –  Meant to be used by multiple applications –  Highly fault tolerant and distributed –  Designed to be hierarchically accessible via a standard protocol: LDAP
  • 16. So you think you know how to Stock the Pantry. •  What’s next?
  • 18. Provisioning! •  Process of getting the right information to the right systems at the right time – CRUD: create, replace, update, delete based on events •  Advice: automation reduces risk
  • 19. Provisioning •  Pushing accounts and attributes shouldn’t be hard –  But it is. Many application vendors figure an admin console is good enough. •  Common options: –  Batch (CSV/LDIF) –  Backend database manipulation (not possible for cloud) –  Provisioning API –  SCIM –  JIT Provisioning
  • 20. Base elements of a provisioning architecture •  Process –  HR adds a new user via admin console –  Manager requests a promotion for an employee –  Customer updates their self-service profile •  Trigger •  Attribute or account change detected in AD •  Help Desk ticket triggers API call to a service •  Business logic executes on data save •  Admin gets an email •  Fulfillment –  Database row inserted –  SCIM call made
  • 21. Provisioning Map •  Process,Trigger, and Fulfillment may all be managed by different people •  A single process often causes multiple triggers and fulfillments SOR HR System Authoritative for: Account Status name department employee# Repo: Active Directory Authoritative for: Identifier email groups password SOR: Social Networks Authoritative for: Login Credential nickname Repo: MySQL Authoritative for: Identifier roles enrollment date Internal Apps Internal APIs Attribute Provider: Billing System Authoritative for: current plan $$ spent plan expiry CC number Sales Rep Cloud Apps P:Admin App Interface T: New DB Entry F: LDAP insert T: New AD Entry F: DB insert T: New AD Entry F: DB insert T: New AD Entry F: SCIM create P: Self Service T:API CAll F: DB Delete T: DB delete F: SCIM delete T: DB delete F: DB delete T: DB update F:API call T: DB delete F: DB delete Repo: Oracle Authoritative for: Scopes Access Tokens T: DB delete F:API Call token wipe T: DB delete F:API Call token wipe T: DB delete F: DB delete
  • 22. Provisioning Solutions •  Provisioning world is a mess –  Old school provisioning about bypassing the app –  No pressure was ever put on vendors •  Provisioning to the cloud cannot happen without cooperation by cloud application vendors –  Many have no provisioning API –  Others have proprietary provisioning APIs •  Which means provisioning efforts are unique snowflakes –  Best hope for the future is SCIM
  • 23. SCIM •  System for Cross-Domain Identity •  It’s just a User Management REST API –  That works the same way everywhere •  Ingredients: –  Users REST endpoint (minimum) –  Basic Auth creds •  or better yet, an OAuth access token –  Create, delete, modify users on somebody else’s platform
  • 24. HTTP Create to User Endpoint { "schemas": [ "urn:scim:schemas:core:1.0” ], "externalId":"bjensen”, "userName":"bjensen", "name”: { "familyName":"Jensen", "givenName":"Barbara” }, "emails": [ {"value":bjensen@babs.com,"type":"work"} ] }
  • 26. Just in Time Provisioning •  Just in Time Provisioning is extremely useful for customer systems – System of Record is the Federation Server – User created in application database the second a SAML assertion arrives from an authoritative source – Note: JIT provisioning often doesn’t handle de-prov
  • 27. Provisioning Architecture SOR HR System Authoritative for: Account Status name department employee# Repo: Active Directory Authoritative for: Identifier email groups password SOR: Social Networks Authoritative for: Login Credential nickname Repo: MySQL Authoritative for: Identifier roles enrollment date Internal Apps Internal APIs Attribute Provider: Billing System Authoritative for: current plan $$ spent plan expiry CC number Sales Rep Cloud Apps F: DB insert F: DB insert T: New AD Entry P: Self Service T:API CAll F: DB Delete T: DB delete F: SCIM delete F: DB delete T: DB delete F: DB delete Repo: Oracle Authoritative for: Scopes Access Tokens T: DB delete F:API Call token wipe F:API Call token wipe F: DB delete Provisioning System F: SCIM create F:API call T: DB delete P:Admin App Interface T: New DB Entry F: LDAP insert
  • 28. Data Ownership & Provenance •  Other issues you need to think of –  Who owns the data? •  Is consent needed to use or move the data? –  Jurisdiction •  Where was the data inputted and where can it legally go? –  Governance •  Can you prove that the system worked the way you mapped it •  SOX Attestation
  • 29. Identities in the Cloud •  How do you redraw your map when your users live in the cloud? –  Architecture becomes fully API & federation driven –  IDaaS creates a “cloud platform” for user identities •  Processes are either part of the IDaaS Service or integrated via API –  The business must start to see itself as a service provider