Re: [scim] SCIM Synchronization Problem

Phillip Hunt <phil.hunt@independentid.com> Thu, 19 August 2021 18:05 UTC

Return-Path: <phil.hunt@independentid.com>
X-Original-To: scim@ietfa.amsl.com
Delivered-To: scim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A26C23A1288 for <scim@ietfa.amsl.com>; Thu, 19 Aug 2021 11:05:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=independentid-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y1lDQlfWGAj5 for <scim@ietfa.amsl.com>; Thu, 19 Aug 2021 11:05:48 -0700 (PDT)
Received: from mail-pf1-x42c.google.com (mail-pf1-x42c.google.com [IPv6:2607:f8b0:4864:20::42c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8185E3A1287 for <scim@ietf.org>; Thu, 19 Aug 2021 11:05:48 -0700 (PDT)
Received: by mail-pf1-x42c.google.com with SMTP id g14so6237876pfm.1 for <scim@ietf.org>; Thu, 19 Aug 2021 11:05:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=independentid-com.20150623.gappssmtp.com; s=20150623; h=content-transfer-encoding:from:mime-version:subject:date:message-id :references:cc:in-reply-to:to; bh=xH5rJizyXGxOzeZWtGSITBQEJg6ZBiir8mVHvAlRd2c=; b=NbKInv9bnmVjF4Kq/yyPx0Y9pnsr9knFNEM+6BzZ3JcjTTxmr8pbQGHtVodQYvTmZv fgQuDBLNroS3Kd9fztFSSmnH6gCOOzPlzNWNQO0+VRoI4LtEWe0+ITGlxPM/qxga3I+o XZmyvJwwzEY5imOsNfjuN6VEMDdYNTbJRMvOrvXBeZlSA3MBTR8/RKE9AOPqaom4wVyM Ve9SVI5sNxM0Nc9dRK+Khpk6tR8y8fpEall7sdX2mgRro065dAkUYmHuXWivtCj9R1Uy GCfqCNDXOQGNkvM2K+lEHE5Hip/XYWVK7wdkt6/iid+zJNNRO/+zAkMxtBrr9bEo5qyY lWKg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:content-transfer-encoding:from:mime-version :subject:date:message-id:references:cc:in-reply-to:to; bh=xH5rJizyXGxOzeZWtGSITBQEJg6ZBiir8mVHvAlRd2c=; b=JBuzvir1Tsyv3rMWf0b5oSAXXbyYDLDOAGO8Lp4ZvJr7t+3ll/Pra2VMxtF5TzYCjr iaZZbYN4mfdCICeS/HksxovVH1KeXW7QDbT2tsILZEl3EwcbvN7sM2qO7a84LweELiIU FAaneQjtIlRHAvSui/LLJA0k0DGX5k6P86522hd0CusfU642C6OjzvdsHuhZnJwiEFNO HtXQbbnysaaexn0dyEmmysTqcMh3lsfczVbuDPupNZC+IVVCGu3Lb5szDV5WIUjUKerZ v6woAzbGeV1qtHWkbYFp39y9aj8hF5uC+k/RrkwCZlX49isD04jdOYLoyTeg0szcsEnp s/JQ==
X-Gm-Message-State: AOAM532kKDzMXAyf+RoYaoirW+FCuS470ukH8CC2cSWCyguXYnlLZ8MK bXpjZH2fnUkDIpoDkpGvj1e48fE2jiEIew==
X-Google-Smtp-Source: ABdhPJwDbAKnWgFW/t8xCeBG0Cdz4pSXP6sJGcarByvahNguDi3vzeTsmomCn/zdNrN2qv96a0/O9w==
X-Received: by 2002:a63:214c:: with SMTP id s12mr15194846pgm.86.1629396346624; Thu, 19 Aug 2021 11:05:46 -0700 (PDT)
Received: from smtpclient.apple ([2605:8d80:460:eba7:c9be:1b67:3ecb:7a12]) by smtp.gmail.com with ESMTPSA id r3sm4013111pff.119.2021.08.19.11.05.45 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 19 Aug 2021 11:05:46 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: Phillip Hunt <phil.hunt@independentid.com>
Mime-Version: 1.0 (1.0)
Date: Thu, 19 Aug 2021 11:05:43 -0700
Message-Id: <11DC0D05-6988-46BE-93B0-80F1244A3779@independentid.com>
References: <MWHPR19MB0957823E52255520BD4DB305E1C09@MWHPR19MB0957.namprd19.prod.outlook.com>
Cc: Danny Mayer <mayer@pdmconsulting.net>, SCIM WG <scim@ietf.org>
In-Reply-To: <MWHPR19MB0957823E52255520BD4DB305E1C09@MWHPR19MB0957.namprd19.prod.outlook.com>
To: "Matt Peterson (mpeterso)" <Matt.Peterson=40oneidentity.com@dmarc.ietf.org>
X-Mailer: iPhone Mail (18G82)
Archived-At: <https://mailarchive.ietf.org/arch/msg/scim/NVAzTm3Bt6mTIJtIlCyWul3GBcs>
Subject: Re: [scim] SCIM Synchronization Problem
X-BeenThere: scim@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Simple Cloud Identity Management BOF <scim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scim>, <mailto:scim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scim/>
List-Post: <mailto:scim@ietf.org>
List-Help: <mailto:scim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scim>, <mailto:scim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Aug 2021 18:05:55 -0000

This is good high level case information. 

Matt, you make a good case for access control standards. It brings out some questions…

Is syncing users and groups enough or must access policy rules/data be synchronized (assuming a common standard for policy)?  How close must separate domains be to work this well together? Is it true that access control is the same across domains?

These issues are what led me to believe client/server RESTful “command”s like POST/PUT/PATCH are insufficient. Instead, what if an event in one domain is published and a subscriber decides how to process the event? In command mode the requestor has to know the command will work. In event mode, the receiver has context to interpret and translate into local commands. 

Maybe we can do a con call and go through security events and how they support arms length cross domain relationships. 

Phil

> On Aug 19, 2021, at 10:33 AM, Matt Peterson (mpeterso) <Matt.Peterson=40oneidentity.com@dmarc.ietf.org> wrote:
> 
> Thank you, Danny, for creating a new thread.  The following are my comments from meeting minutes (some edits):
> 
> There appears to be two use cases for "synchronization": 
> 
>  1.  Constructing and enforcing Application authorization models -  An application (acting as a SCIM client) caches users/groups data from the IdP in order to present "user/group pickers" when presenting screens used to configure the application  authorization rules (RBAC, Policy, or ACL).  Also, when the application enforces authorization, user and group data needs to be immediately available so that authorization decisions can be made quickly.
> 
>  2.  Identity Management and Governance systems - implement a canonical identity model" where all accounts and groups are represented.  This model is used to build provisioning rules and calculate separation of duty violations, attestations, and approvals etc.   Management-time evaluation of the model needs to be done efficiently without external calls to the SCIM service provider.
> 
> Both above use cases, are "client-cache" use cases that need only a "one-way" sync (from the SCIM server to the SCIM client).   To accomplish there are two distinct steps:  a) download the initial results (users/groups) and, b) keep the cached copy of these initial results (user/groups) up to date with changes that are being made on the SCIM Service provider.   
> 
> I think it could help us narrow down the list of suitable approaches if we could agree that "one-way" sync (keeping a client-side cache up to date) is our target.
> 
> --
> Matt Peterson
> 
> -----Original Message-----
> From: scim <scim-bounces@ietf.org> On Behalf Of Danny Mayer
> Sent: Wednesday, August 18, 2021 8:34 AM
> To: SCIM WG <scim@ietf.org>
> Subject: [scim] SCIM Synchronization Problem
> 
> CAUTION: This email originated from outside of the organization. Do not follow guidance, click links, or open attachments unless you recognize the sender and know the content is safe.
> 
> 
> I decided that this needs it's own thread and not be part of the meeting minutes.
> 
> I have had a great deal of experience dealing with the user account synchronization problem. Here's my view of the problems.
> 
> I will be calling one system Management Server and the other system Application Server. I found client/server labels confusing. The Management Server is what I am defining to be the server that sends updates to add/update/remove users and groups to the Application server whose account, groups and access permissions are being managed.
> 
> First some definitions of user accounts. There are usually more than one of each of these:
> 1. Builtin accounts
> 2. Special-purpose accounts
> 3. Employee
> 4. Contractor
> 5. Agent
> 6. Customer
> 
> There may be more.
> 
> 1. Builtin accounts: These are accounts that applications have and there may be more than one. There is always an admin account which can do anything, for example the administrator account in Active Directory or a database admin account. The application may have more accounts for other purposes.
> 
> 2. Special-purpose accounts: These may be set up to provide access to other applications, for example a SCIM request to a SCIM REST API should be handled by a special account which cannot be used to login via a UI interface and only be able to perform certain functions. In addition there may be accounts set up to listen for topics or queues on a message queue among other possibilities. Keeping separate accounts like this are important for tracking in logs and applications.
> 
> 3. Employee: These are accounts that employees may login to the application.
> 
> 4. Contractors: These accounts that a contractor performing work for the company may use to log into an application. Unlike Employee accounts these would have an expiration date.
> 
> 5. Agent: Accounts like this are for external users who may need to manage information for their own customers. An example of this is an insurance agent logging in to handle an insurance policy for their clients.
> 
> 6. Customers: These are where the customers are using the application directly. For a bank it's likely to be millions of customers. The management platform should not be involved in managing these accounts.
> 
> Let's now look at a few example applications.
> 
> 1. Helpdesk
> All employees and contractors will need to be able to log into a helpdesk application and enter tickets. This means loading information about all employees and contractors. For a company with only 1000 employees that's manageable. For a company with 100K employees, it's a bigger challenge.
> 
> 2. Customer Support
> Only employees or contractors in the department providing customer support need access plus a few other employees. In addition identified customers may need accounts.
> 
> 3. Expenses
> Not all employees or contractors will be submitting expenses so it may not be necessary to have accounts for all possible users. This is something that the application owner needs to decide.
> 
> Now let's look at logistics.
> 
> Bulk load:
> Each application will need an initial set of accounts set up and for something like a helpdesk this could involve load 1000-100,000 accounts.
> The information needed could come from either the management server or separately, say from an HR system. Many servers that I have encountered limit the number of records to something like 1000, so the pagination requirement is needed for this. Even when dealing with a limited subset of employees or contractors you can run into this need.
> 
> Synchronization
> An application that is bulk-loaded above may need to be synchronized to the management server if the data did not come from the management server.
> 
> Change Management
> This is really a synchronization issue as well. Changes happen all the time and new employees/contractors need to be added, terminated ones removed and updates happen all the time. The best way of dealing with this may be to set up a message queue that each application can subscribe to and they can take the needed action when it's convenient for that application. It's not the only method but it's the one I found to be the most helpful. There are two ways of doing that: 1. send the complete user information for new accounts, send just the change for updating accounts, send the ID for terminated accounts along with some meta information. The other method which I have used is just to send the ID and whether it's new, updated or terminated.
> 
> I hope this is helpful to the discussion.
> 
> Danny
> 
> 
> _______________________________________________
> scim mailing list
> scim@ietf.org
> https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fscim&amp;data=04%7C01%7Cmatt.peterson%40quest.com%7C1fb1fe803b8c439026bd08d9625553ba%7C91c369b51c9e439c989c1867ec606603%7C0%7C0%7C637648940889425726%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=riJQy3jEHltc6ZFCaEe%2B6%2F2ecXN0SWBXOxIZAKLxum4%3D&amp;reserved=0
> 
> _______________________________________________
> scim mailing list
> scim@ietf.org
> https://www.ietf.org/mailman/listinfo/scim