Introduction
This article is the continuation
of Part I which describes the architecture of a Solution that addresses the
requirements of a Sample Use case described later.
In Part I, some key concepts were
discussed. Below is a list of topics introduced in Part I of this post:
·
Scoped Administrative Roles
·
Access Policies
·
Disconnected Application Instance
·
Entitlements
This list is intended to serve as
a reminder to the audience of the concepts comprising the foundation of the
proposed solution.
This post will focus on the
following use case:
A Real-Estate Company needs to
implement a Provisioning solution to control access to the company's
applications. Users log in to an application and are granted access to the
application’s features based on group memberships in LDAP groups.
The company has hundreds of LDAP
groups controlling what users can do within applications; individual assignment
of those entitlements would be highly impractical.
In addition, the company is about
to complete three acquisitions and needs to be able to quickly incorporate the
new assets to the provisioning framework and start controlling access grants
for the new employees coming over from the acquisitions. This is very complex
to achieve since the acquired companies have their own directories which will
not go away overnight.
Part III will provide the step by
step instructions on how to address the requirements.