SlideShare a Scribd company logo
1 of 55
Download to read offline
SCIM: Why It’s More
Important, and More
Simple, Than You Think
Kelly Grizzle
Software Architect - SailPoint
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.2
Agenda
• What is SCIM?
• Why is it important?
• How is it being used?
• Deeper Dive
• How simple is it?
What is SCIM?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.4
System for
Cross-Domain
Identity
Management* And yes … it is also simple
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.5
What is SCIM?
•  SCIM is a standard that defines schema and protocol for identity
management.
•  Schema
-  Users and Groups
-  Extensible
-  JSON
•  Protocol
-  REST
-  CRUD + Search + Discovery + Bulk
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.6
Identity Protocol Landscape
Provisioning Authentication Authorization
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.7
What problems does SCIM solve?
• How do I keep my organization’s users in sync with
service X?
-  How do I provision a user account for service X?
-  How do I deprovision a user account from service X?
-  How do I update an existing account for service X?
• How do I manage groups?
-  How do I add or remove users from groups to give them the
correct level of access?
-  How do I create new groups?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.8
An example speaks 1111101000 words…
POST /v2/Users HTTP/1.1
Host: example.com
Accept: application/json
Content-Type: application/json
Authorization: Bearer h480djs93hd8
Content-Length: ...
{
"schemas": ["urn:scim:schemas:core:2.0:User"],
"externalId": "bjensen",
"userName":"bjensen",
"name": {
"familyName": "Jensen",
"givenName": "Barbara"
}
}
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.9
History Lesson
July ‘10
Conceived
at CIS
May ‘11
Work starts
under OWF
Dec ‘11
Version 1.0
June/July ‘12
IETF WG
chartered
Version 1.1
Late ‘14
Version 2.0
Why is SCIM
important?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.11
A typical environment
Firewall
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.12
That’s the typical case … Ouch!
•  Environments are complex
-  Many systems both on-prem and off-prem
•  Every system has to deal with identity
-  Name, email, title, custom meta-information, entitlements, …
•  Identity must be maintained across systems
-  Need one-way and often two-way synchronization
•  Authorization is often driven from an external system
-  Example: Active Directory groups drive groups and
permissions in other applications.
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.13
Other common pain points
•  Mergers and acquisitions
-  Need to quickly connect applications after M&A
•  BYOA (bring your own app)
-  Proliferation of SaaS apps has lead to using applications that
IT does not even know about
•  Mobile
-  Another case of BYOA where mobile apps need identity
information
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.14
How is identity management done?
•  Manual hand-entry
-  Error prone and slow
•  Bulk upload
-  High latency – often a one-time operation
•  Custom APIs and connectors
-  High cost to develop against
-  Proprietary to each service provider
•  SAML Just-in-Time Provisioning
-  No pre-provisioning
-  No deprovisioning
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.15
And then … there’s SCIM
•  Low cost to develop
-  Write once and reuse
-  Open source libraries
-  Well-known and agreed upon standard
•  Handles full lifecycle of identity
-  Create, update, AND delete
•  Real-time
-  No waiting for manual intervention
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.16
Who else thinks SCIM is important?
How is SCIM
being used?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.18
Surprisingly – not just in the cloud
•  SCIM was initially created with cloud use cases in mind
•  It turns out that a common language to move identities on-
premises is really useful
•  This is some of the first “real world” adoption of SCIM
•  Case study: Large company with 3500 connected
applications and 82,000 users moved to SCIM for internal
systems
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.19
In the enterprise
Firewall
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.20
Unsurprisingly – also in the cloud
•  SaaS providers have started implementing SCIM for their
identity APIs
-  Salesforce.com, Cisco Webex, etc…
•  Clients call these APIs from an on-premises identity
management system to manage identities
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.21
Ground to cloud
Firewall
SCIM
Proprietary
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.22
Cloud Identity Bridge
•  Important when on-premises applications need to be
managed from the cloud
•  Allows a single, secured SCIM channel through the firewall
•  Translates SCIM requests to native APIs behind the firewall
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.23
Cloud to ground
Firewall
Identity Bridge
Cloud Identity
Management
Provider
SCIM
Native APIs
Deeper Dive
Schema
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.25
Schema
•  Core models for User and Group
•  JSON representation
•  Extensible
-  Extend existing resources (eg – enterprise user)
-  Define new resources (eg – role, entitlement, device)
-  JSON format for describing schema
-  Standard data types and references between objects
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.26
Example: User
{
"schemas": ["urn:scim:schemas:core:2.0:User"],
"id": "2819c223-7f76-453a-919d-413861904646",
"externalId": "bjensen",
"meta": {
"resourceType": "User",
"created": "2011-08-01T18:29:49.793Z",
"lastModified": "2011-08-01T18:29:49.793Z",
"location": "https://example.com/v1/Users/2819c223...",
"version": "W/"f250dd84f0671c3"
},
"name": {
"formatted": "Ms. Barbara J Jensen III",
"familyName": "Jensen",
"givenName": "Barbara"
},
"userName": "bjensen",
"phoneNumbers": [
{
"value": "555-555-8377",
"type": "work"
}
]
}
Required
Complex
Simple
Multi-valued
Object type
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.27
Example: Extended User
{
"schemas":["urn:scim:schemas:core:2.0:User",
"urn:scim:schemas:extension:enterprise:2.0:User"],
"id": "2819c223-7f76-453a-919d-413861904646",
"externalId": "bjensen",
"userName": "bjensen",
"urn:scim:schemas:extension:enterprise:2.0:User": {
"employeeNumber": "701984",
"costCenter": "4130",
"organization": "Universal Studios",
"division": "Theme Park",
"department": "Tour Operations",
"manager": {
"managerId": "26118915-6090-4610-87e4-49d8ca9f808d",
"$ref": "/Users/26118915-6090-4610-87e4-49d8ca9f808d",
"displayName": "John Smith"
}
}
}
Declaration
Use
Deeper Dive
API
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.29
Operations
•  Create = POST https://example.com/{v}/{resource}
•  Read = GET https://example.com/{v}/{resource}/{id}
•  Update = PUT https://example.com/{v}/{resource}/{id}
•  Delete = DELETE https://example.com/{v}/{resource}/{id}
•  *Update = PATCH https://example.com/{v}/{resource}/{id}
•  *Search = GET https://example.com/{v}/{resource}?
filter={attribute} {op} {value} & sortBy={attributeName} &
sortOrder={ascending|descending} & startIndex={start} &
count={maxResults}
•  *Bulk
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.30
Create Request
POST /v2/Users HTTP/1.1
Host: example.com
Accept: application/json
Authorization: Bearer h480djs93hd8
{
"schemas": ["urn:scim:schemas:core:2.0:User"],
"externalId": "bjensen",
"userName":"bjensen",
"name": {
"familyName": "Jensen",
"givenName": "Barbara"
}
}
Operation Resource Type
AuthZ
“User” Payload
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.31
Create Response
HTTP/1.1 201 Created
Content-Type: application/json
Location: https://example.com/v2/Users/281...
ETag: W/"e180ee84f0671b1"
{
"schemas": ["urn:scim:schemas:core:2.0:User"],
"id": "2819c223-7f76-453a-919d-413861904646",
"externalId": "bjensen",
"meta": {
"created": "2011-08-01T21:32:44.882Z",
"lastModified": "2011-08-01T21:32:44.882Z",
"location": "https://example.com/v2/Users/281...",
"version": "W/"e180ee84f0671b1""
},
"name":{
"familyName":"Jensen",
...
Result code
“Permalink”
SP generated ID
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.32
Discovery
•  GET /Schemas
-  Defines primary object definitions and extensions
•  GET /ResourceTypes
-  Defines available resources
•  endpoint URL, primary schema, schema extensions
•  GET /ServiceProviderConfigs
-  Spec compliance
•  Support for bulk, patch, etc…
-  Authentication schemes
•  OAuth, HTTP basic, etc…
Deeper Dive
Extensions
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.34
Extending an existing resource type
•  The SCIM core schema objects – User and Group – try to
cover the common 80%
•  Almost always extended by service providers to add custom
attributes
•  Only two steps required:
1.  Create a new schema that contains the extended attributes
2.  Add the new schema to the schemaExtensions list for the
resource type
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.35
Extending – Schema
{
"id" : "urn:grizzle:1.0:ConferenceGoer",
"name" : "Conference Goer",
"description" : "Info about a person that attends CIS",
"attributes" : [{
"name" : "shirtSize",
"type" : "string",
"multiValued" : false,
"description" : "What conference doesn't have a t-shirt?",
"required" : false,
"caseExact" : false,
"mutability" : "readWrite",
"returned" : "always",
"uniqueness" : "server"
}]
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.36
Extending – Resource Type
{
"schemas": ["urn:scim:schemas:core:2.0:ResourceType"],
"id":"User",
"name":"User",
"endpoint": "/Users",
"description": "Core User",
"schema": "urn:scim:schemas:core:2.0:User",
"schemaExtensions": [{
"schema": "urn:grizzle:1.0:ConferenceGoer",
"required": false
}
]
}
Add custom
extensions
here
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.37
Creating a custom resource type
•  Completely new resource types may be created to model
objects that are unique to the service provider
•  Client can use /ResourceTypes endpoint to discover these
•  Somewhat common for service providers to implement
•  Only two steps required:
1.  Create a new schema that contains the attributes
2.  Create a new resource type that references this schema
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.38
Custom resource type – Schema
{
"id" : "urn:grizzle:1.0:BlogPost",
"name" : "Blog Post",
"description" : "A post to a blog",
"attributes" : [{
"name" : "title",
"type" : "string",
"multiValued" : false,
"description" : "The title of the blog post",
"required" : true,
"caseExact" : false,
"mutability" : "readWrite",
"returned" : "always",
"uniqueness" : "server"
},
... other attributes - id, content, author, date, etc ...
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.39
Custom resource type – Resource Type
{
"schemas": ["urn:scim:schemas:core:2.0:ResourceType"],
"id": "BlogPost",
"name": "Blog Post",
"endpoint": "/BlogPosts",
"description": "Posts to a boring blog",
"schema": "urn:grizzle:1.0:BlogPost"
}
Reference the custom schema
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.40
Custom resource type – GET Request
GET /v2/BlogPosts
Host: example.com
Authorization: Bearer h480djs93hd8
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.41
Custom resource type – GET Response
HTTP/1.1 200 OK
Content-Type: application/json
{
"schemas": ["urn:scim:api:messages:2.0:ListResponse"],
"totalResults": 5,
"Resources": [{
"id": "281838-af839018e4-8377ba87e90",
"title": "Welcome to my blog!",
"content": "...",
"meta": {
"resourceType": "BlogPost",
"created": "2011-08-01T21:32:44.882Z",
"lastModified": "2011-08-01T21:32:44.882Z",
"location": "https://example.com/v2/BlogPosts/281..."
How simple is
SCIM?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.43
SCIM Core Values
•  Simplicity
-  “Make it as simple as possible but no simpler.”
- Einstein
•  Solving real-world problems
•  Ease of implementation by consumers
-  Don’t make it too hard for service providers either
•  Support the 80% in the core
-  Extensions for everything else
•  Interoperability
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.44
How to kick the tires
•  Download the UnboundID Reference Server Implementation
if you need a server to test against
-  https://www.unboundid.com/resources/scim/
•  If you are trying to play with a service provider’s API
-  cURL
-  REST Console (Chrome Extension)
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.45
cURL
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.46
REST Console
•  A Chrome extension that easily allows making REST calls
•  Use this if a command line scares you
•  There are other alternatives out there
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.47
Getting under the hood
•  If you want to write a SCIM client or server there are a number of
open source libraries
•  Most libraries currently support SCIM 1.1 (not 2.0)
•  UnboundID SDK
-  Client and server java libraries
-  Most full-featured and well maintained
•  python-scim
-  SCIM object models for Python
•  scim-query-filter-parser
-  Search filter parsing library for Ruby
•  More at http://www.simplecloud.info/#implementations
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.48
UnboundID SDK
•  Open source and developed by UnboundID
•  Recent enhancements to improve client usability -
https://code.google.com/p/scimsdk/source/detail?r=355
•  I prototyped a SCIM server and wrote a library to make
server development easier
-  Library cut the lines of code by 68% (down to <300)
-  Needs a bit of work to be ready for prime time
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.49
It’s so easy even Mark Diodati can do it!
•  Mark wrote a SCIM client while an analyst at Gartner
•  Written in Perl
•  Reads attributes from a SCIM server and writes to an Excel
file
•  Reads changes in Excel file and synchronizes them to a
SCIM server
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.50
Wait … I already have a REST API!
•  Option 1: Have a separate URL-space for identity-related
SCIM APIs
-  https://example.com/rest/MyObjects
-  https://example.com/rest/scim/Users
•  Option 2: Consider using SCIMs schemas and resource
types to define your entire REST API
-  It is already well-defined
-  Supports many data types and references between objects
-  It is self-describing through /Schemas and /ResourceTypes
-  Make use of SCIM libraries for fast implementation
•  Just do it! Customers constantly ask for a common API!
What next?
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.52
Key take-aways
•  Identity and app proliferation = frustration
•  SCIM is the only sustainable option that can handle the
scale and complexity of provisioning in today’s environments
•  Build a standards-based identity infrastructure
-  Provisioning à SCIM
-  Authentication à OpenID Connect or SAML
-  Authorization à OAuth2
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.53
What does it mean for me?
•  Consider using SCIM for your internal environment
-  Not just a cloud API
•  SCIM is a good foundation for any REST API
-  It can be used for more than just identities
•  It’s easy to get started if you use the tools that are already
available
•  Use SCIM 1.1 for now
-  Real-world adoption of SCIM 2.0 will happen in 2015
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.54
References
• Start here…
- http://www.simplecloud.info/
•  Get involved here…
-  http://www.ietf.org/mail-archive/web/scim/current/maillist.html
•  All of the gory details here…
-  http://datatracker.ietf.org/wg/scim/documents/
-  http://datatracker.ietf.org/doc/draft-ietf-scim-api/
-  http://datatracker.ietf.org/doc/draft-ietf-scim-core-schema/
•  Implementing a client or server in Java? Start here…
-  https://www.unboundid.com/resources/scim/
•  Implementing a client or server in not Java? Start here…
-  http://www.simplecloud.info/#implementations
Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.55
Questions
kelly.grizzle@sailpoint.com
@kelly_grizzle
http://simplecloud.info

More Related Content

What's hot

CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CloudIDSummit
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMWSO2
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMHasiniG
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementNishant Kaushik
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCloudIDSummit
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platformOracleIDM
 
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestCANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestChris Phillips
 
Mr. desmond cloud security_format
Mr. desmond cloud security_formatMr. desmond cloud security_format
Mr. desmond cloud security_formatMULTIMATICS_ID
 
Oracle UCM: Web Site Performance Tuning
Oracle UCM: Web Site Performance TuningOracle UCM: Web Site Performance Tuning
Oracle UCM: Web Site Performance TuningBrian Huff
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)Brian Huff
 
Oracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationOracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationDelivery Centric
 
Deploying an Extranet on SharePoint
Deploying an Extranet on SharePointDeploying an Extranet on SharePoint
Deploying an Extranet on SharePointAlan Marshall
 
Round table guide
Round table guideRound table guide
Round table guideOracleIDM
 
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeThuan Ng
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trinings
 
Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportionsOracleIDM
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in checkOracleIDM
 

What's hot (20)

CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestCANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
 
Mr. desmond cloud security_format
Mr. desmond cloud security_formatMr. desmond cloud security_format
Mr. desmond cloud security_format
 
Oracle UCM: Web Site Performance Tuning
Oracle UCM: Web Site Performance TuningOracle UCM: Web Site Performance Tuning
Oracle UCM: Web Site Performance Tuning
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
 
Oracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationOracle Directory Services - Customer Presentation
Oracle Directory Services - Customer Presentation
 
Deploying an Extranet on SharePoint
Deploying an Extranet on SharePointDeploying an Extranet on SharePoint
Deploying an Extranet on SharePoint
 
Round table guide
Round table guideRound table guide
Round table guide
 
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in check
 

Similar to CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think

CIS 2015 SCIM in the Real World - Kelly Grizzle
CIS 2015 SCIM in the Real World -  Kelly GrizzleCIS 2015 SCIM in the Real World -  Kelly Grizzle
CIS 2015 SCIM in the Real World - Kelly GrizzleCloudIDSummit
 
School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComTaunyaCoffman887
 
Gcp intro-20160721
Gcp intro-20160721Gcp intro-20160721
Gcp intro-20160721Haeseung Lee
 
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018Amazon Web Services
 
#SPSOttawa introduction to the #microsoftGraph
#SPSOttawa introduction to the #microsoftGraph#SPSOttawa introduction to the #microsoftGraph
#SPSOttawa introduction to the #microsoftGraphVincent Biret
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deploymentsSAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deploymentsChris Kernaghan
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Perficient
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterForgeRock
 
Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...Sara Barbosa
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud finalsapenov
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak
 
What serverless means for enterprise apps
What serverless means for enterprise appsWhat serverless means for enterprise apps
What serverless means for enterprise appsSumit Sarkar
 
Applying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationApplying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationKacy Clarke
 

Similar to CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think (20)

CIS 2015 SCIM in the Real World - Kelly Grizzle
CIS 2015 SCIM in the Real World -  Kelly GrizzleCIS 2015 SCIM in the Real World -  Kelly Grizzle
CIS 2015 SCIM in the Real World - Kelly Grizzle
 
School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud Com
 
Gcp intro-20160721
Gcp intro-20160721Gcp intro-20160721
Gcp intro-20160721
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
 
#SPSOttawa introduction to the #microsoftGraph
#SPSOttawa introduction to the #microsoftGraph#SPSOttawa introduction to the #microsoftGraph
#SPSOttawa introduction to the #microsoftGraph
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
 
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deploymentsSAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...Why the Microsoft 365 Administrator should care about the Power Platform Gove...
Why the Microsoft 365 Administrator should care about the Power Platform Gove...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud final
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
What serverless means for enterprise apps
What serverless means for enterprise appsWhat serverless means for enterprise apps
What serverless means for enterprise apps
 
Applying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationApplying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migration
 
Choosing and Using Cloud Services with SharePoint
Choosing and Using Cloud Services with SharePointChoosing and Using Cloud Services with SharePoint
Choosing and Using Cloud Services with SharePoint
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think

  • 1. SCIM: Why It’s More Important, and More Simple, Than You Think Kelly Grizzle Software Architect - SailPoint
  • 2. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.2 Agenda • What is SCIM? • Why is it important? • How is it being used? • Deeper Dive • How simple is it?
  • 4. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.4 System for Cross-Domain Identity Management* And yes … it is also simple
  • 5. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.5 What is SCIM? •  SCIM is a standard that defines schema and protocol for identity management. •  Schema -  Users and Groups -  Extensible -  JSON •  Protocol -  REST -  CRUD + Search + Discovery + Bulk
  • 6. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.6 Identity Protocol Landscape Provisioning Authentication Authorization
  • 7. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.7 What problems does SCIM solve? • How do I keep my organization’s users in sync with service X? -  How do I provision a user account for service X? -  How do I deprovision a user account from service X? -  How do I update an existing account for service X? • How do I manage groups? -  How do I add or remove users from groups to give them the correct level of access? -  How do I create new groups?
  • 8. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.8 An example speaks 1111101000 words… POST /v2/Users HTTP/1.1 Host: example.com Accept: application/json Content-Type: application/json Authorization: Bearer h480djs93hd8 Content-Length: ... { "schemas": ["urn:scim:schemas:core:2.0:User"], "externalId": "bjensen", "userName":"bjensen", "name": { "familyName": "Jensen", "givenName": "Barbara" } }
  • 9. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.9 History Lesson July ‘10 Conceived at CIS May ‘11 Work starts under OWF Dec ‘11 Version 1.0 June/July ‘12 IETF WG chartered Version 1.1 Late ‘14 Version 2.0
  • 11. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.11 A typical environment Firewall
  • 12. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.12 That’s the typical case … Ouch! •  Environments are complex -  Many systems both on-prem and off-prem •  Every system has to deal with identity -  Name, email, title, custom meta-information, entitlements, … •  Identity must be maintained across systems -  Need one-way and often two-way synchronization •  Authorization is often driven from an external system -  Example: Active Directory groups drive groups and permissions in other applications.
  • 13. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.13 Other common pain points •  Mergers and acquisitions -  Need to quickly connect applications after M&A •  BYOA (bring your own app) -  Proliferation of SaaS apps has lead to using applications that IT does not even know about •  Mobile -  Another case of BYOA where mobile apps need identity information
  • 14. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.14 How is identity management done? •  Manual hand-entry -  Error prone and slow •  Bulk upload -  High latency – often a one-time operation •  Custom APIs and connectors -  High cost to develop against -  Proprietary to each service provider •  SAML Just-in-Time Provisioning -  No pre-provisioning -  No deprovisioning
  • 15. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.15 And then … there’s SCIM •  Low cost to develop -  Write once and reuse -  Open source libraries -  Well-known and agreed upon standard •  Handles full lifecycle of identity -  Create, update, AND delete •  Real-time -  No waiting for manual intervention
  • 16. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.16 Who else thinks SCIM is important?
  • 18. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.18 Surprisingly – not just in the cloud •  SCIM was initially created with cloud use cases in mind •  It turns out that a common language to move identities on- premises is really useful •  This is some of the first “real world” adoption of SCIM •  Case study: Large company with 3500 connected applications and 82,000 users moved to SCIM for internal systems
  • 19. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.19 In the enterprise Firewall
  • 20. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.20 Unsurprisingly – also in the cloud •  SaaS providers have started implementing SCIM for their identity APIs -  Salesforce.com, Cisco Webex, etc… •  Clients call these APIs from an on-premises identity management system to manage identities
  • 21. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.21 Ground to cloud Firewall SCIM Proprietary
  • 22. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.22 Cloud Identity Bridge •  Important when on-premises applications need to be managed from the cloud •  Allows a single, secured SCIM channel through the firewall •  Translates SCIM requests to native APIs behind the firewall
  • 23. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.23 Cloud to ground Firewall Identity Bridge Cloud Identity Management Provider SCIM Native APIs
  • 25. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.25 Schema •  Core models for User and Group •  JSON representation •  Extensible -  Extend existing resources (eg – enterprise user) -  Define new resources (eg – role, entitlement, device) -  JSON format for describing schema -  Standard data types and references between objects
  • 26. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.26 Example: User { "schemas": ["urn:scim:schemas:core:2.0:User"], "id": "2819c223-7f76-453a-919d-413861904646", "externalId": "bjensen", "meta": { "resourceType": "User", "created": "2011-08-01T18:29:49.793Z", "lastModified": "2011-08-01T18:29:49.793Z", "location": "https://example.com/v1/Users/2819c223...", "version": "W/"f250dd84f0671c3" }, "name": { "formatted": "Ms. Barbara J Jensen III", "familyName": "Jensen", "givenName": "Barbara" }, "userName": "bjensen", "phoneNumbers": [ { "value": "555-555-8377", "type": "work" } ] } Required Complex Simple Multi-valued Object type
  • 27. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.27 Example: Extended User { "schemas":["urn:scim:schemas:core:2.0:User", "urn:scim:schemas:extension:enterprise:2.0:User"], "id": "2819c223-7f76-453a-919d-413861904646", "externalId": "bjensen", "userName": "bjensen", "urn:scim:schemas:extension:enterprise:2.0:User": { "employeeNumber": "701984", "costCenter": "4130", "organization": "Universal Studios", "division": "Theme Park", "department": "Tour Operations", "manager": { "managerId": "26118915-6090-4610-87e4-49d8ca9f808d", "$ref": "/Users/26118915-6090-4610-87e4-49d8ca9f808d", "displayName": "John Smith" } } } Declaration Use
  • 29. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.29 Operations •  Create = POST https://example.com/{v}/{resource} •  Read = GET https://example.com/{v}/{resource}/{id} •  Update = PUT https://example.com/{v}/{resource}/{id} •  Delete = DELETE https://example.com/{v}/{resource}/{id} •  *Update = PATCH https://example.com/{v}/{resource}/{id} •  *Search = GET https://example.com/{v}/{resource}? filter={attribute} {op} {value} & sortBy={attributeName} & sortOrder={ascending|descending} & startIndex={start} & count={maxResults} •  *Bulk
  • 30. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.30 Create Request POST /v2/Users HTTP/1.1 Host: example.com Accept: application/json Authorization: Bearer h480djs93hd8 { "schemas": ["urn:scim:schemas:core:2.0:User"], "externalId": "bjensen", "userName":"bjensen", "name": { "familyName": "Jensen", "givenName": "Barbara" } } Operation Resource Type AuthZ “User” Payload
  • 31. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.31 Create Response HTTP/1.1 201 Created Content-Type: application/json Location: https://example.com/v2/Users/281... ETag: W/"e180ee84f0671b1" { "schemas": ["urn:scim:schemas:core:2.0:User"], "id": "2819c223-7f76-453a-919d-413861904646", "externalId": "bjensen", "meta": { "created": "2011-08-01T21:32:44.882Z", "lastModified": "2011-08-01T21:32:44.882Z", "location": "https://example.com/v2/Users/281...", "version": "W/"e180ee84f0671b1"" }, "name":{ "familyName":"Jensen", ... Result code “Permalink” SP generated ID
  • 32. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.32 Discovery •  GET /Schemas -  Defines primary object definitions and extensions •  GET /ResourceTypes -  Defines available resources •  endpoint URL, primary schema, schema extensions •  GET /ServiceProviderConfigs -  Spec compliance •  Support for bulk, patch, etc… -  Authentication schemes •  OAuth, HTTP basic, etc…
  • 34. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.34 Extending an existing resource type •  The SCIM core schema objects – User and Group – try to cover the common 80% •  Almost always extended by service providers to add custom attributes •  Only two steps required: 1.  Create a new schema that contains the extended attributes 2.  Add the new schema to the schemaExtensions list for the resource type
  • 35. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.35 Extending – Schema { "id" : "urn:grizzle:1.0:ConferenceGoer", "name" : "Conference Goer", "description" : "Info about a person that attends CIS", "attributes" : [{ "name" : "shirtSize", "type" : "string", "multiValued" : false, "description" : "What conference doesn't have a t-shirt?", "required" : false, "caseExact" : false, "mutability" : "readWrite", "returned" : "always", "uniqueness" : "server" }]
  • 36. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.36 Extending – Resource Type { "schemas": ["urn:scim:schemas:core:2.0:ResourceType"], "id":"User", "name":"User", "endpoint": "/Users", "description": "Core User", "schema": "urn:scim:schemas:core:2.0:User", "schemaExtensions": [{ "schema": "urn:grizzle:1.0:ConferenceGoer", "required": false } ] } Add custom extensions here
  • 37. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.37 Creating a custom resource type •  Completely new resource types may be created to model objects that are unique to the service provider •  Client can use /ResourceTypes endpoint to discover these •  Somewhat common for service providers to implement •  Only two steps required: 1.  Create a new schema that contains the attributes 2.  Create a new resource type that references this schema
  • 38. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.38 Custom resource type – Schema { "id" : "urn:grizzle:1.0:BlogPost", "name" : "Blog Post", "description" : "A post to a blog", "attributes" : [{ "name" : "title", "type" : "string", "multiValued" : false, "description" : "The title of the blog post", "required" : true, "caseExact" : false, "mutability" : "readWrite", "returned" : "always", "uniqueness" : "server" }, ... other attributes - id, content, author, date, etc ...
  • 39. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.39 Custom resource type – Resource Type { "schemas": ["urn:scim:schemas:core:2.0:ResourceType"], "id": "BlogPost", "name": "Blog Post", "endpoint": "/BlogPosts", "description": "Posts to a boring blog", "schema": "urn:grizzle:1.0:BlogPost" } Reference the custom schema
  • 40. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.40 Custom resource type – GET Request GET /v2/BlogPosts Host: example.com Authorization: Bearer h480djs93hd8
  • 41. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.41 Custom resource type – GET Response HTTP/1.1 200 OK Content-Type: application/json { "schemas": ["urn:scim:api:messages:2.0:ListResponse"], "totalResults": 5, "Resources": [{ "id": "281838-af839018e4-8377ba87e90", "title": "Welcome to my blog!", "content": "...", "meta": { "resourceType": "BlogPost", "created": "2011-08-01T21:32:44.882Z", "lastModified": "2011-08-01T21:32:44.882Z", "location": "https://example.com/v2/BlogPosts/281..."
  • 43. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.43 SCIM Core Values •  Simplicity -  “Make it as simple as possible but no simpler.” - Einstein •  Solving real-world problems •  Ease of implementation by consumers -  Don’t make it too hard for service providers either •  Support the 80% in the core -  Extensions for everything else •  Interoperability
  • 44. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.44 How to kick the tires •  Download the UnboundID Reference Server Implementation if you need a server to test against -  https://www.unboundid.com/resources/scim/ •  If you are trying to play with a service provider’s API -  cURL -  REST Console (Chrome Extension)
  • 45. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.45 cURL
  • 46. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.46 REST Console •  A Chrome extension that easily allows making REST calls •  Use this if a command line scares you •  There are other alternatives out there
  • 47. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.47 Getting under the hood •  If you want to write a SCIM client or server there are a number of open source libraries •  Most libraries currently support SCIM 1.1 (not 2.0) •  UnboundID SDK -  Client and server java libraries -  Most full-featured and well maintained •  python-scim -  SCIM object models for Python •  scim-query-filter-parser -  Search filter parsing library for Ruby •  More at http://www.simplecloud.info/#implementations
  • 48. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.48 UnboundID SDK •  Open source and developed by UnboundID •  Recent enhancements to improve client usability - https://code.google.com/p/scimsdk/source/detail?r=355 •  I prototyped a SCIM server and wrote a library to make server development easier -  Library cut the lines of code by 68% (down to <300) -  Needs a bit of work to be ready for prime time
  • 49. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.49 It’s so easy even Mark Diodati can do it! •  Mark wrote a SCIM client while an analyst at Gartner •  Written in Perl •  Reads attributes from a SCIM server and writes to an Excel file •  Reads changes in Excel file and synchronizes them to a SCIM server
  • 50. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.50 Wait … I already have a REST API! •  Option 1: Have a separate URL-space for identity-related SCIM APIs -  https://example.com/rest/MyObjects -  https://example.com/rest/scim/Users •  Option 2: Consider using SCIMs schemas and resource types to define your entire REST API -  It is already well-defined -  Supports many data types and references between objects -  It is self-describing through /Schemas and /ResourceTypes -  Make use of SCIM libraries for fast implementation •  Just do it! Customers constantly ask for a common API!
  • 52. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.52 Key take-aways •  Identity and app proliferation = frustration •  SCIM is the only sustainable option that can handle the scale and complexity of provisioning in today’s environments •  Build a standards-based identity infrastructure -  Provisioning à SCIM -  Authentication à OpenID Connect or SAML -  Authorization à OAuth2
  • 53. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.53 What does it mean for me? •  Consider using SCIM for your internal environment -  Not just a cloud API •  SCIM is a good foundation for any REST API -  It can be used for more than just identities •  It’s easy to get started if you use the tools that are already available •  Use SCIM 1.1 for now -  Real-world adoption of SCIM 2.0 will happen in 2015
  • 54. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.54 References • Start here… - http://www.simplecloud.info/ •  Get involved here… -  http://www.ietf.org/mail-archive/web/scim/current/maillist.html •  All of the gory details here… -  http://datatracker.ietf.org/wg/scim/documents/ -  http://datatracker.ietf.org/doc/draft-ietf-scim-api/ -  http://datatracker.ietf.org/doc/draft-ietf-scim-core-schema/ •  Implementing a client or server in Java? Start here… -  https://www.unboundid.com/resources/scim/ •  Implementing a client or server in not Java? Start here… -  http://www.simplecloud.info/#implementations
  • 55. Copyright © SailPoint Technologies, Inc. 2013 All rights reserved.55 Questions kelly.grizzle@sailpoint.com @kelly_grizzle http://simplecloud.info