SCIM Use Cases Phil Hunt, Bhumip Khasnabish, Anthony.

Slides:



Advertisements
Similar presentations
Building Portals to access Grid Middleware National Technical University of Athens Konstantinos Dolkas, On behalf of Andreas Menychtas.
Advertisements

Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Agenda AD to Windows Azure AD Sync Options Federation Architecture
1 Use Cases 2 CSSE 371 Software Requirements and Specification Mark Ardis, Rose-Hulman Institute September 20, 2004.
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
Federated sign-in WS-Federation WS-Trust SAML 2.0 Metadata Shibboleth Graph API Synchronize accounts Authentication.
3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
Robustness Analysis Dr. Neal CIS 480. Outline What is robustness analysis? Key roles in robustness analysis Object types found in discovery Diagramming.
Use cases and requirement specification - 1 Use case diagrams 3 use cases System boundaries Remember: Use case diagramming is a tool, not the requirements.
Functional Requirements – Use Cases Sriram Mohan/Steve Chenoweth (Chapters 14, 21 – Requirements Text) 1.
Functional Requirements – Use Cases Steve Chenoweth & Chandan Rupakheti (Chapters 14, 21 – Requirements Text)  Quiz question 9 relates to this, when you’ve.
Important when you launch Yammer Enterprise Create an engaged and trusted community Decide about User Profile Syncs Various User and Admin.
AD description template definition Marián Mlynarovič FIIT Lectures 2006.
Box User Days 1 – 2 april Box Enterprise Leuven –What? –Why? –How? Box Essentials –Adding content –Finding what you need.
Updating User Information Password – use this field to change your own password Confirm Password – retype the new password for verification purposes To.
Prabath Siriwardena Senior Software Architect. An open source Identity & Entitlement management server.
Scenario covered in this presentation Separate credential from on- premises credential Authentication occurs via cloud directory service Does not.
Form Builder Iteration 2 User Acceptance Testing (UAT) Denise Warzel Semantic Infrastructure Operations Team Presented to caDSR Curation Team March.
Cloud Computing Cloud Security– an overview Keke Chen.
ARC312. Security Policy Governance Audit Reporting Analysis Data Quality Directory Logon Mobility Provisioning Development Access Control Authentication.
CaDSR Software Development Update Denise Warzel Semantic Infrastructure Operations Team Presented to caDSR Content team November 2012.
SASL-SAML update Klaas Wierenga Kitten WG 9-Nov-2010.
Local Data Access User Story Sub Workgroup Thursday August 29 th, 2013.
Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Single Sign-On Multiple Benefits via Alaska K20 Identity Federation 20 May 2011 BTOP Partner Meeting Anchorage, Alaska 20 May 2011 BTOP Partner Meeting.
Team ELL System Requirements Ladakeysha Thomas Elizabeth Waldo LaWanda Warren Brandon Williams.
Goals One ASP.NET Membership story – Web APIs and Web Apps Profile. Extensibility allows for non SQL persistence model. Improve unit testability of.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Presentation_title Forefront Identity Manager 2010
Identity Decision Tree Framework Quick Reference Guides.
SAML in Authorization Policies draft-guenther-geopriv-saml-policy-01.
Current list of common attributes of the EDIT federation Single Sign-On for the EDIT platform Lutz Suhrbier¹, Andreas Kohlbecker², Andreas Müller² 1 Freie.
Identity in the Cloud (ID-Cloud) Towards standardizing Cloud Identity
1 Use Case Modeling Reference: RUP Doc. Use Case Example 2.
Module 3: Managing a Microsoft ® Windows ® Small Business Server Environment.
OAuth Use Cases Zachary Zeltsan 31 March Outline Why use cases? Present set in the draft draft-zeltsan-oauth-use-cases-01.txt by George Fletcher.
Capturing Requirements with Use Cases
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Office 365 Office 365 Overview & InfrastructureAdministering Lync Online.
Guidance for Running Multiple IPv6 Prefixes (draft-liu-v6ops-running-multiple-prefixes-02) Bing Liu, Sheng Jiang (Speaker), Yang Bo IETF91
Capturing and Exploring Requirements with Use Cases and UML Models
Conference Control Manipulation Protocol (CCMP) draft-ietf-xcon-ccmp-03.txt Authors: Mary Barnes Chris Boulton.
With ADFS and Azure Active Directory
Microsoft Identity Integration Server & Role Base Access Theo Kostelijk Consultant Microsoft BV
80th IETF Prague Czech1 Requirements and Framework of VPN-oriented Cloud Services Ning
Identities and Azure AD Premium
05 Jul 2006CSE403, Summer'06, Lecture08 Lecture 08: Techniques for Gathering Requirements Valentin Razmov “The goal of requirements engineering is to develop.
Improving the Usability and Security of OpenID Mike Jones Microsoft Federated Identity Team
WSO2 Identity Server 4.0 Fall WSO2 Carbon Enterprise Middleware Platform 2.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
George Wang, Ph.D. COMP 380/L Lesson 2. Use Case Use cases are a way to capture system functionalities (i.e., functional requirements) Based on use case.
Box User Days 7/11/2014. Box Enterprise Leuven –What? –Why? –How? Box Essentials –Adding content –Finding what you need –Box Mobile.
Registration StratusLab Tutorial (Orsay, France) 28 November 2012.
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
Registratio n User Terms & Condition s Data Vault (Data & instruction set) Accounts (member & non-member 3 rd parties) Contacts Options Home (summary.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
IETF Provisioning of Symmetric Keys (keyprov) WG Update WG Chairs: Phillip Hallam-Baker Hannes Tschofenig Presentation by Mingliang Pei 05/05/2008.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Identity Events IIW April 2016.
Systems Analysis and Design in a Changing World, 6th Edition
SaaS Application Deep Dive
Microsoft Virtual Academy
NextGen Access Control Platform
Systems Analysis and Design in a Changing World, 6th Edition
The Path to IAM Maturity
SCIM Use Case Scenario.
SharePoint Online Authentication Patterns
Site scripts and Site Design
Use Case Document Example
INTEGRATIONS WITH Enterprise HRIS
Presentation transcript:

SCIM Use Cases Phil Hunt, Bhumip Khasnabish, Anthony Nadalin, Zachary Zeltsan, Kepeng Li,

Outline User scenarios Use cases Requirements

Use Cases -- in 00 version Change of the ownership of a resource Migration of the identifiers Single Sign-On (SSO) Provisioning of the user accounts for a Community of Interest Update attributes of a user who had previously interacted with a relying party web site Change notification

Template for a use case Description Pre-condition Post-condition Requirements

User Scenarios: SCIM Actors

User Scenarios – added in 01 version Cloud Service Provider to Cloud Service Provider Flows CSP -> CSP: Create Identity (Push) CSP -> CSP: Update Identity (Push) CSP -> CSP: Delete Identity (Push) CSP -> CSP: SSO Trigger (Push) CSP -> CSP: SSO Trigger (Pull) CSP -> CSP: Password Reset (Push) Enterprise Service Provider to Cloud Service Provider Flows ECS -> CSP: Create Identity (Push) ECS -> CSP: Update Identity (Push) ECS -> CSP: Delete Identity (Push) ECS -> CSP: SSO Trigger (Push)

Future work and next step Future work Align with SCIM API and SCIM scheme drafts More security considerations More reviews and feedbacks Next step Accept it as a WG draft?