-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Discuss/Define: Group Provisioning and Deprovisioning #21
Comments
One problem I frequently encounter when managing groups is the "Cartesian Product of Groups" within individual business applications. A Common Example: Imagine "Business App A" which is built on top of a RACF system. For an end user to perform their job in Business App A, they need both a RACF Group and a RACF Profile assigned to them. ->Today, this situation is reasonably complex for an IAM system to manage. To support access requests or access certifications we either need to:
Honestly, all 3 of these options are ugly. (I would argue Option 1 is best, but it still requires unnecessary leg work by the IAM team to create and define roles with the correct business logic). While I used RACF to illustrate the problem, I have seen this same issue with other on-prem apps and also some SaaS apps. As part of the IPSIE standard, we should fix this. To achieve IPSIE compliance, applications should provide a clear interface—such as an API endpoint, stored procedure, or similar mechanism—that allows IAM systems to seamlessly manage their internal access models without forcing IAM teams to "hack" solutions. |
@2MarkMaguire you're poking at an interesting problem, which is that IdPs and RPs manage entitlements in different ways. Imagine the scenario below:
How would you propose an IdP obtains a consistent interface to manage this complex environment? Is such an interface possible? |
topic should cover:
The text was updated successfully, but these errors were encountered: