Upstream Provisioning For A Multi-Directory Identity Repository
Upstream Provisioning For A Multi-Directory Identity Repository
Upstream Provisioning For A Multi-Directory Identity Repository
multi-directory identity
repository
A Bull Evidian white paper
Upstream provisioning
By Philippe Franois
Architect
Version 1.0
Contents
An example of use
An integrated upstream provisioning
solution
Upstream provisioning
2006 Evidian
The information in this document reflects Evidian's opinion on the subjects under discussion at the time of publication.
Due to the constantly changing market conditions to which Evidian must adapt, they cannot be taken as a
commitment on Evidian's part and their accuracy is not guaranteed beyond the date of publication.
This document is supplied for information only. EVIDIAN MAKES NO EXPRESS OR IMPLIED GUARANTEE IN THIS
DOCUMENT.
We acknowledge the rights of the proprietors of the trademarks mentioned in this publication.
Upstream provisioning
Table of contents
At the heart of identity and access management ......... 4
Building an identity repository .........................5
Main functions of upstream provisioning .................7
Synchronization functions .............................. 7
Activating downstream functions ........................ 7
Logging ................................................ 7
39 A2 72LT Rev00
Upstream provisioning
Evidian recommends the use of a model which allows you to separate identity data
from access-rights-defining data and the procedure used to build them.
Evidian recommends V.I.M. (Virtual Identity Manager). For more information, you
may download the white paper from http://www.evidian.com/fr/security/im/wpvim.php?c=wprefid
39 A2 72LT Rev00
Upstream provisioning
Authoritative
data
Assigned
data
Definition
Data which defines
identity in the broad
sense of the user
Data which defines user
access rights on target
systems and applications
Examples
Surname, first name, company
identifier, organization, job, position
in the company, site, office, phone
number, etc.
Application logins and passwords,
privileges, timetable for use, LDAP
group membership, etc.
39 A2 72LT Rev00
Upstream provisioning
This incoherent situation results in high non-quality costs:
A loss of productivity for the IT teams, which must manage the same data in
several places and in several formats
Figure 2.
Upstream provisioning
39 A2 72LT Rev00
Upstream provisioning
Synchronization functions
Defining and applying a multi-repository synchronization policy.
Logging
Logging identity management operations for analysis and reporting.
Synchronization policy
Generally, the synchronization policys application range must be restricted to userdefining authoritative data.
This policy will allow the application of the following rules:
The reconciliation rules for authoritative data depend on the level of trust or
reliability associated with each set of data. If a users telephone number is different
in two directories, you only need to define a rule for determining the reference
data.
39 A2 72LT Rev00
Upstream provisioning
The reconciliation rules for assigned data (data generally provisioned on target
systems) compare the reality of data on a target system with the value that it
should have according to the access security policy. They must, therefore,
interface with the policy engine. The result of a reconciliation in favor of the actual
data may be a change in the access security policy.
Repositories
Upstream provisioning works on different types of repositories and data.
The most common technologies are LDAP directories, relational databases or even
flat files (csv, ldif, etc.).
Furthermore, it is possible to
find interfaces to the Human
Resources (HR) application
databases. In fact, the HR
databases may contain
information required to
define users, or may even
initiate user-identity creation
or deletion events within the
information system.
Figure 3.
If the global identity and access management solution has its own identity base,
upstream provisioning must naturally integrate this base into the synchronization
mechanisms.
A special case: target application and system repositories
In some cases, the internal repository of the application itself may contain some
identity data. Upstream provisioning may then use the technical mechanisms, such as
agents and connectors, generally used by downstream provisioning to integrate the
target data into the identity repository.
In fact, these connectors and agents use public and regular interfaces (API) supplied
by the application provider. Instead of giving direct access to the application's internal
repository, the use of these public APIs enhances the stability of the installed solution.
39 A2 72LT Rev00
Upstream provisioning
A multi-level organization
To create consistent sets of source data, it is possible to associate a set of
associated source repositories with master source repositories (through joint
mechanisms). A master source contains the record to which the associated source
data may be assigned. Deleting a master record will completely erase the record,
whereas deleting an associated record will be considered as absence of data to be
processed, if necessary, using the synchronization rules.
This first aggregation level is used to organize the data so as to have the same view
of data from different sources. In this case, the synchronization rules may be top-level
rules and may be applied to all the accessible data.
39 A2 72LT Rev00
Upstream provisioning
Rules typology
Quite paradoxically, you can implement upstream provisioning just using four basic
rules:
Join
This rule allows you to base the recording of an associated source on one or more
master sources.
Attribute Mapping
You can use this rule to define a correspondence relation between attributes from
different sources. This relation is well-ordered and leads to an attribute update. This
update can also result from the application of an intermediate transformation function.
Finally, this correspondence relation enables you to update multi-value attributes from
several sources. A simple example of multi-value attribute is the e-mail address
attribute: in fact, an employee can have several e-mail addresses within an
organization: [email protected], [email protected],
[email protected], [email protected], First name/
Name/Org/Country.... Each e-mail address is available in a specific directory. They
can be consolidated within a single e-mail address repository through a multi-value
attribute.
39 A2 72LT Rev00
10
Upstream provisioning
Creation
If a user exists in a master repository but not in an associated repository, you can
use this rule to create all the attributes associated with this user, in the associated
repository.
Deletion
This rule automatically deletes a user's attributes from an associated repository if
this user has been deleted from the master repository.
Other rules
You can work out other rules for creating attributes in repositories. These other rules
generally concern the creation of assigned data. Therefore, they are naturally
integrated into the policy manager, from which you can create and provision the user
access rights on the target applications and systems, using the identity data and in
keeping with the policy.
39 A2 72LT Rev00
11
Upstream provisioning
Figure 6.
You can thus create a repository which will enable you, for instance, to define an
LDAP directory for Enterprise SSO.
39 A2 72LT Rev00
12
Upstream provisioning
Case 2: creating an identity repository using an identity and access management
solutions database
In this case, upstream provisioning allows you to fill and consistently maintain the
identity base with an identity and access management tool. In general, this base is
managed by an identity management module and is used by the downstream
provisioning modules. This base can be called a security repository. It can contain all
or only a subset of user data (cf. the 3 cases below).
Figure 7.
39 A2 72LT Rev00
13
Upstream provisioning
Case 3: using the LDAP directory as identity repository
This is an extension of the previous case. This is the case where the identity and
access management solution is using an external LDAP directory as identity
repository. The security repository may then contain, for instance, the downstream
provisioning data or even additional identity data.
Figure 8.
39 A2 72LT Rev00
14
Upstream provisioning
Case 4: synchronizing with target application data
This is the most comprehensive case for which some user data in the target
applications internal repositories may be used as authoritative data sources.
It is then possible to use agents and connectors to synchronize the target applications
data with the other different authoritative sources.
Figure 9.
39 A2 72LT Rev00
15
Upstream provisioning
An example of use
The following example of use is a real case of implementation with Evidians
AccessMaster. It uses upstream-provisioning possibilities as well LDAP / securityrepository coupling.
Based on the technical characteristics of upstream provisioning, it is possible to
describe the following case of use:
Users are defined in 3 source databases:
The Mainframe repository, which contains an employees surname, first name and
login
The HR repository, which contains additional data such as e-mail address, location,
telephone number, and fax number
The exception CSV files, which contain the list of a users e-mail addresses. This
list contains the log of a users e-mail addresses following different acquisitions,
consolidations and domain changes.
2
The main target database is Active Directory, which contains the list of local Active
Directory groups.
The master repository is the mainframe repository. The presence or absence of a user
in this repository determines the presence or absence of said user in Active Directory.
Data update rules are based on 4 types of flows.
Creating users
Users are created in Active Directory with all their attributes. The first name, surname
and login come from the mainframe repository, and additional data such as e-mail
addresses, the location or telephone number come from the HR database. If a user
has several e-mail addresses, the multi-value field e-mail address in Active Directory
retrieves all the addresses.
Mainframe
HR DB
Exceptions
ActiveDirectory
In this case of use, the notions of local groups and global groups must simply be
understood as follows:
- A local group is a group defined in Active Directory.
- A global group is a group defined in the mainframe.
39 A2 72LT Rev00
16
Upstream provisioning
ActiveDirectory
39 A2 72LT Rev00
17
Upstream provisioning
39 A2 72LT Rev00
18
Upstream provisioning
39 A2 72LT Rev00
19
Upstream provisioning
Upstream provisioning
Upstream provisioning is one of the key elements of an identity and access
management solution. It can be simply understood as the use of synchronization
mechanisms to create an identity repository into which items have been integrated
that are natively used to interface the modules of an identity and access management
solution.
Upstream
provisioning
Synchronization
Integration
It is this integration that will enable a complex organization to define and apply a
global identity and access management policy.
39 A2 72LT Rev00
20