IETF explores new working group on identity management in the cloud
Network World - Proponents of a common scheme for managing user identity in cloud-based applications will pitch their idea to the Internet's premier standards-setting body at a meeting in Paris later this month.
A specification already exists for Simple Cloud Identity Management (SCIM) that is supported by security software vendors including Cisco, Courion, Ping Identity, UnboundID and SailPoint. SCIM also has support from key cloud vendors, including Salesforce, Google and VMware.
At issue is whether SCIM will become an IETF-approved working group and eventually an industry standard.
The IETF is hosting a meeting to discuss the proposed SCIM working group on March 29. In January, the IETF created a mailing list to discuss SCIM.
Proponents of SCIM say the protocol will make it easier for companies to control access to data stored in popular cloud-based applications like Salesforce, Workday, Taleo, Box and others.
Gartner backs the idea of SCIM as a simpler method of provisioning and de-provisioning employees from cloud applications - a process that's currently handled manually in most corporations. Mark Diodati, a research vice president with Gartner, wrote in late February "it appears that SCIM remains on track."
One vendor that's a strong proponent of SCIM is UnboundID, which sells identity management infrastructure software for service providers.
"There is no meaningful way to sling identities from cloud to cloud or from cloud to premises applications," explained UnboundID's CEO Steve Shoaff. "UnboundID is one of the only vendors shipping a commercial version that allows you to broadcast SCIM events and receive SCIM events. It's a modern protocol and a way to share identities between cloud providers. We're building our entire portfolio around SCIM to really build the identity economy."
Proponents say that what's good about SCIM compared with previous identity standards such as SPML is that SCIM is lightweight, it doesn't try to do too many functions, and it uses a Web services approach.
The alternative to SCIM is the proliferation of proprietary APIs for each cloud application. This situation requires security software vendors like Courion and SailPoint to create custom connectors to provision each cloud-based application.
Instead, SCIM would provide a standard way to move identity data from premises-based to cloud applications and from one cloud application to another.
"We're seeing a lot of interest" in SCIM, says Patrick Harding, CTO of Ping Identity. "We haven't had strong standards in that space. All the vendors developed their own APIs. That's where we've been working for the last year with all the major [software-as-a-service] vendors to standardize on an API mechanism to automate the account management."
- Where You Mitigate Heartbleed Matters Read this article to learn more about why customers must choose the most strategic point in the network at which to deploy their...
- Mitigating Multiple DDoS Attack Vectors It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats. Download this infographic...
- Looking to the Horizon: SDN Software-defined networking is one of the hottest buzzwords of 2014, but saying exactly what SDN is can be a challenge. SDN has its...
- The Challenge of a Wider Network As virtualization becomes more popular on wide area networks, IT administrators are finding that virtual machines (VMs) are touchy about latency and packet...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Network Security White Papers | Webcasts