SlideShare a Scribd company logo
Allidm.com 
Discovering Identity and Access Management Solutions 
OpenIDM 
Architecture
Stay connected to Allidm 
Find us on Facebook: 
https://www.facebook.com/allidm 
Follow us on Twitter: 
https://twitter.com/aidy_idm 
Look for us on LinkedIn: 
http://www.linkedin.com/in/identityandaccessmanagement 
Visit our blog: 
http://www.allidm.com/blog
Disclaimer and Acknowledgments 
The contents here are created as a own personal endeavor and 
thus does not reflect any official stance of any Identity and 
Access Management Vendor on any particular technology.
Contact Us 
On this presentation we’ll talk about some useful topics that 
you can use no matter which identity and access management 
solution or product you are working on. 
If you know one that make a big difference please tell us to 
include it in the future 
aidy.allidm@gmail.com
OpenIDM architecture
Modular Framework 
 The OpenIDM framework is based on OSGi. 
 OSGi 
 OSGi is a module system and service platform for the Java 
programming language that implements a complete and 
dynamic component model. 
 OpenIDM currently runs in Apache Felix. 
 Servlet 
 The optional Servlet layer provides RESTful HTTP access to 
the managed objects and services. 
 OpenIDMembeds Jetty by default.
Infrastructure Modules 
 BPMN 2.0 Workflow Engine 
 Embedded workflow and business process engine based on 
Activiti and the Business Process Model and Notation (BPMN) 2.0 
standard. 
 Task Scanner 
 Task scanning mechanism that enables you to perform a batch 
scan for a specified date in OpenIDM data, on a scheduled 
interval, and then to execute a task when this date is reached. 
 Scheduler 
 Scheduler provides a cron-like scheduling component 
implemented using the Quartz library. 
 For example, to enable regular synchronizations and reconciliations.
Infrastructure Modules… 
 Script Engine 
 Script engine is a pluggable module that provides the triggers and plugin 
points for OpenIDM. 
 OpenIDM currently supports JavaScript and Groovy. 
 Policy Service 
 Provides an extensible policy service that enables you to apply specific 
validation requirements to various components and properties. 
 Audit Logging 
 Auditing logs all relevant system activity to the configured log stores. 
 This includes the data from reconciliation as a basis for reporting, as well 
as detailed activity logs to capture operations on the internal (managed) 
and external (system) objects.
Infrastructure Modules… 
 Repository 
 Repository provides a common abstraction for a pluggable 
persistence layer. 
 The default, embedded implementation for the repository is 
the NoSQL database OrientDB. 
 OpenIDM 3.0.0 supports use of MySQL to back the 
repository. 
 Plugin repositories can include NoSQL and relational 
databases, LDAP, and even flat files. 
 Repository API operates using a JSON-based object model 
with RESTful principles consistent with the other OpenIDM 
services.
 Object Model 
Core Services 
 Artifacts handled by OpenIDM are Java object representations of 
the JavaScript object model as defined by JSON. 
 These representations are instances of 
classes:Map, List, String, Number, Boolean, and null. 
 Object model supports interoperability and potential integration 
with many applications, services and programming languages 
 OpenIDM can serialize and deserialize these structures to and 
from JSON as required. 
 OpenIDM also exposes a set of triggers and functions that 
system administrators can define, in either JavaScript or Groovy
Core Services… 
 Managed Objects 
 A managed object is an object that represents the identity-related 
data managed by OpenIDM. 
 Managed objects are configurable, JSON-based data 
structures that OpenIDM stores in its pluggable repository. 
 The default configuration of a managed object is that of a 
user 
 You can define any kind of managed object 
 For example, groups or roles. 
 You can access managed objects over the REST interface
Core Services… 
 System Objects 
 System objects are pluggable representations of objects 
on external systems. 
 For example, a user entry that is stored in an external LDAP 
directory 
 System objects follow the same RESTful resource-based 
design principles as managed objects. 
 There is a default implementation for the OpenICF 
framework, that allows any connector object to be 
represented as a system object
 Mappings 
Core Services… 
 Mappings define policies between source and target 
objects and their attributes during synchronization and 
reconciliation. 
 Mappings can also define triggers for validation, 
customization, filtering, and transformation of source 
and target objects.
Core Services… 
 Synchronization & Reconciliation 
 Reconciliation enables on-demand and scheduled 
resource comparisons between the OpenIDMmanaged 
object repository and source or target systems. 
 Comparisons can result in different actions, depending on 
the mappings defined between the systems. 
 Synchronization enables creating, updating, and 
deleting resources from a source to a target system, 
either on demand or according to a schedule.
Secure Commons REST Commands 
 Representational State Transfer (REST) is a software 
architecture style for exposing resources, using the 
technologies and protocols of the World Wide Web. 
 REST interfaces are commonly tested with 
a curl command. 
 Work with the standard ports associated with Java EE 
communications, 8080 and 8443. 
 To run curl over the secure port, 8443, you must include 
either the --insecure option, or run in Restrict REST Access 
to the HTTPS Port.
Access Layer 
 The access layer provides the user interfaces and 
public APIs for accessing and managing the OpenIDM 
repository and its functions. 
 RESTful Interfaces 
 OpenIDM provides REST APIs for CRUD operations and 
invoking synchronization and reconciliation for both HTTP 
and Java. 
 User Interfaces 
 User interfaces provide password management, 
registration, self-service, and workflow services.
Allidm.com 
Discovering Identity and Access Management Solutions 
OpenIDM 
Architecture

More Related Content

PPTX
OpenIDM - An Introduction
PPTX
OpenIDM: An Introduction
PPTX
OpenIDM - Flexible Provisioning Platform - April 28 Webinar
PPTX
Identity Manager OpenSource OpenIDM - introduction
PPTX
OPENIDM: DID YOU JUST SAAS ME?
PPTX
OpenDJ - An Introduction
PPTX
Case Study: Utilizing OpenIDM with an External AJAX Interface
PPTX
Webinar: OpenIDM 3.1
OpenIDM - An Introduction
OpenIDM: An Introduction
OpenIDM - Flexible Provisioning Platform - April 28 Webinar
Identity Manager OpenSource OpenIDM - introduction
OPENIDM: DID YOU JUST SAAS ME?
OpenDJ - An Introduction
Case Study: Utilizing OpenIDM with an External AJAX Interface
Webinar: OpenIDM 3.1

What's hot (20)

PPT
Case Study: University of California, Berkeley and San Francisco
PPTX
OpenIDM 3.0 - What's New
PPTX
IDM Reconciliation
PPTX
OpenDJ: An Introduction
PPTX
OpenAM - An Introduction
PPT
THE FORGEROCK PLATFORM BIG PICTURE
PDF
Identity as a Managed Cloud Service
PPTX
OIS Architecture Review
PPT
Open Identity Stack Roadmap
PDF
Case Study: Plus Retail - Moving from the Old World to the New World
PDF
Federation in Practice
PPTX
OpenAM: An Introduction
PPTX
Identity Management with the ForgeRock Identity Platform - So What’s New?
PPTX
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
PDF
OpenAM Best Practices - Corelio Media Case Study
PDF
Implementing eGov
PDF
Shoot Me a Token: OpenAM as an OAuth2 Provider
PPT
Incredible Edible Identity
PDF
OpenAM as Flexible Integration Component
ODP
Apache Syncope and Tirasa
Case Study: University of California, Berkeley and San Francisco
OpenIDM 3.0 - What's New
IDM Reconciliation
OpenDJ: An Introduction
OpenAM - An Introduction
THE FORGEROCK PLATFORM BIG PICTURE
Identity as a Managed Cloud Service
OIS Architecture Review
Open Identity Stack Roadmap
Case Study: Plus Retail - Moving from the Old World to the New World
Federation in Practice
OpenAM: An Introduction
Identity Management with the ForgeRock Identity Platform - So What’s New?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
OpenAM Best Practices - Corelio Media Case Study
Implementing eGov
Shoot Me a Token: OpenAM as an OAuth2 Provider
Incredible Edible Identity
OpenAM as Flexible Integration Component
Apache Syncope and Tirasa
Ad

Viewers also liked (20)

PPTX
IAM Password
PPTX
IAM Cloud
PPTX
IDM Introduction
PPTX
Dell Password Manager Introduction
PDF
Introduction to IDM
PPTX
Dell Password Manager Architecture - Components
PPTX
Opendj - A LDAP Server for dummies
PPTX
Dell Quest TPAM Privileged Access Control
PPTX
Securing your Cloud Deployment
PDF
Was Ist Identity Relationship Management (IRM) - Webinar auf Deutsch
PDF
ForgeRock Webinar - Was ist Identity Relationship Management?
PDF
Common IDM How-To's
PDF
Case study using idm and a web portal as a gateway to the cloud june 2012
PPTX
Directory Introduction
PPTX
Cloud introduction
PDF
IDM & IAM 2012
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PPTX
AssureBridge - SSO to Many B2B Service Providers - Marketing presentation
PPTX
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
PPTX
Engineering Cryptographic Applications: Symmetric Encryption
IAM Password
IAM Cloud
IDM Introduction
Dell Password Manager Introduction
Introduction to IDM
Dell Password Manager Architecture - Components
Opendj - A LDAP Server for dummies
Dell Quest TPAM Privileged Access Control
Securing your Cloud Deployment
Was Ist Identity Relationship Management (IRM) - Webinar auf Deutsch
ForgeRock Webinar - Was ist Identity Relationship Management?
Common IDM How-To's
Case study using idm and a web portal as a gateway to the cloud june 2012
Directory Introduction
Cloud introduction
IDM & IAM 2012
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
AssureBridge - SSO to Many B2B Service Providers - Marketing presentation
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
Engineering Cryptographic Applications: Symmetric Encryption
Ad

Similar to Identity Manager Opensource OpenIDM Architecture (20)

PPTX
OIS Roadmap
PDF
Managing OpenAFS users with OpenIDM
PPTX
National Citizen Target SOA Architecture Sept 2016
PPTX
Oracle Identity Manager Basics
PPT
Open Source & Identity Management
PDF
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
PPTX
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
PDF
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
PPTX
Oracle Identity and access management overview
PDF
Echidna, sistema de respuesta a incidentes open source [GuadalajaraCON 2013]
PDF
Open iam technicalarchitecture-v3-a
PDF
IdM Reference Architecture
PDF
Complete open source IAM solution
PDF
Web Development in Advanced Threat Prevention
PDF
Concerto Brochure
PDF
Sim-webcast-part1-1aa
PDF
Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti
PPTX
AMIS Oracle OpenWorld 2015 Review – part 3- PaaS Database, Integration, Ident...
PDF
CISSP Prep: Ch 9. Software Development Security
PDF
8. Software Development Security
OIS Roadmap
Managing OpenAFS users with OpenIDM
National Citizen Target SOA Architecture Sept 2016
Oracle Identity Manager Basics
Open Source & Identity Management
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
Oracle Identity and access management overview
Echidna, sistema de respuesta a incidentes open source [GuadalajaraCON 2013]
Open iam technicalarchitecture-v3-a
IdM Reference Architecture
Complete open source IAM solution
Web Development in Advanced Threat Prevention
Concerto Brochure
Sim-webcast-part1-1aa
Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti
AMIS Oracle OpenWorld 2015 Review – part 3- PaaS Database, Integration, Ident...
CISSP Prep: Ch 9. Software Development Security
8. Software Development Security

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Cloud computing and distributed systems.
PDF
Approach and Philosophy of On baking technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Understanding_Digital_Forensics_Presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Cloud computing and distributed systems.
Approach and Philosophy of On baking technology
MIND Revenue Release Quarter 2 2025 Press Release
20250228 LYD VKU AI Blended-Learning.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25 Week I
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Identity Manager Opensource OpenIDM Architecture

  • 1. Allidm.com Discovering Identity and Access Management Solutions OpenIDM Architecture
  • 2. Stay connected to Allidm Find us on Facebook: https://www.facebook.com/allidm Follow us on Twitter: https://twitter.com/aidy_idm Look for us on LinkedIn: http://www.linkedin.com/in/identityandaccessmanagement Visit our blog: http://www.allidm.com/blog
  • 3. Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect any official stance of any Identity and Access Management Vendor on any particular technology.
  • 4. Contact Us On this presentation we’ll talk about some useful topics that you can use no matter which identity and access management solution or product you are working on. If you know one that make a big difference please tell us to include it in the future aidy.allidm@gmail.com
  • 6. Modular Framework  The OpenIDM framework is based on OSGi.  OSGi  OSGi is a module system and service platform for the Java programming language that implements a complete and dynamic component model.  OpenIDM currently runs in Apache Felix.  Servlet  The optional Servlet layer provides RESTful HTTP access to the managed objects and services.  OpenIDMembeds Jetty by default.
  • 7. Infrastructure Modules  BPMN 2.0 Workflow Engine  Embedded workflow and business process engine based on Activiti and the Business Process Model and Notation (BPMN) 2.0 standard.  Task Scanner  Task scanning mechanism that enables you to perform a batch scan for a specified date in OpenIDM data, on a scheduled interval, and then to execute a task when this date is reached.  Scheduler  Scheduler provides a cron-like scheduling component implemented using the Quartz library.  For example, to enable regular synchronizations and reconciliations.
  • 8. Infrastructure Modules…  Script Engine  Script engine is a pluggable module that provides the triggers and plugin points for OpenIDM.  OpenIDM currently supports JavaScript and Groovy.  Policy Service  Provides an extensible policy service that enables you to apply specific validation requirements to various components and properties.  Audit Logging  Auditing logs all relevant system activity to the configured log stores.  This includes the data from reconciliation as a basis for reporting, as well as detailed activity logs to capture operations on the internal (managed) and external (system) objects.
  • 9. Infrastructure Modules…  Repository  Repository provides a common abstraction for a pluggable persistence layer.  The default, embedded implementation for the repository is the NoSQL database OrientDB.  OpenIDM 3.0.0 supports use of MySQL to back the repository.  Plugin repositories can include NoSQL and relational databases, LDAP, and even flat files.  Repository API operates using a JSON-based object model with RESTful principles consistent with the other OpenIDM services.
  • 10.  Object Model Core Services  Artifacts handled by OpenIDM are Java object representations of the JavaScript object model as defined by JSON.  These representations are instances of classes:Map, List, String, Number, Boolean, and null.  Object model supports interoperability and potential integration with many applications, services and programming languages  OpenIDM can serialize and deserialize these structures to and from JSON as required.  OpenIDM also exposes a set of triggers and functions that system administrators can define, in either JavaScript or Groovy
  • 11. Core Services…  Managed Objects  A managed object is an object that represents the identity-related data managed by OpenIDM.  Managed objects are configurable, JSON-based data structures that OpenIDM stores in its pluggable repository.  The default configuration of a managed object is that of a user  You can define any kind of managed object  For example, groups or roles.  You can access managed objects over the REST interface
  • 12. Core Services…  System Objects  System objects are pluggable representations of objects on external systems.  For example, a user entry that is stored in an external LDAP directory  System objects follow the same RESTful resource-based design principles as managed objects.  There is a default implementation for the OpenICF framework, that allows any connector object to be represented as a system object
  • 13.  Mappings Core Services…  Mappings define policies between source and target objects and their attributes during synchronization and reconciliation.  Mappings can also define triggers for validation, customization, filtering, and transformation of source and target objects.
  • 14. Core Services…  Synchronization & Reconciliation  Reconciliation enables on-demand and scheduled resource comparisons between the OpenIDMmanaged object repository and source or target systems.  Comparisons can result in different actions, depending on the mappings defined between the systems.  Synchronization enables creating, updating, and deleting resources from a source to a target system, either on demand or according to a schedule.
  • 15. Secure Commons REST Commands  Representational State Transfer (REST) is a software architecture style for exposing resources, using the technologies and protocols of the World Wide Web.  REST interfaces are commonly tested with a curl command.  Work with the standard ports associated with Java EE communications, 8080 and 8443.  To run curl over the secure port, 8443, you must include either the --insecure option, or run in Restrict REST Access to the HTTPS Port.
  • 16. Access Layer  The access layer provides the user interfaces and public APIs for accessing and managing the OpenIDM repository and its functions.  RESTful Interfaces  OpenIDM provides REST APIs for CRUD operations and invoking synchronization and reconciliation for both HTTP and Java.  User Interfaces  User interfaces provide password management, registration, self-service, and workflow services.
  • 17. Allidm.com Discovering Identity and Access Management Solutions OpenIDM Architecture