SailPoint Technical Integration Guide
SailPoint Technical Integration Guide
1
SCIM Connector
Overview
The SCIM connector adds a SCIM API to BeyondInsight to allow third party applications to view and modify
our users, groups, and smart rule permissions.
This implements http://www.simplecloud.info/ for Password Safe.
It also implements the PAM extension viewable here: https://tools.ietf.org/html/draft-grizzle-scim-pam-ext-
00
To configure the IdentityIQ SCIM application manually, there are some configuration differences from the
default schema to modify, as follows.
Account Schema:
▪ Under name, remove middleName, honorificPrefix, and honorificSuffix
▪ Remove nickName, profileUrl, title, userType, preferredLanguage, locale, timezone
▪ Remove all email fields and replace with a single "email" field
For the provisioning form, if you intend to create Active Directory users only, the native identifier needs to be
populated with the distinguished name. All other fields will be populated with what's in Active Directory. The
following is a script to populate IdentityIQ fields allowed values for distinguished name:
import java.util.*; import sailpoint.object.*; import sailpoint.api.*;
}
}
return adLinks;
Once you enable and save the connector, the API will be available to access. On the Connector page you will see
credential information specific to your user account:
▪ Client ID
▪ A button to recycle your client secret
▪ A button to generate a refresh token (you must provide your client secret and login password)
The client ID and secret are part of your credentials for requesting refresh and access tokens. The
authentication endpoint is [host]/scim/oauth/token/.
To request a refresh token you would send a POST request with a body in this format:
grant_type=password&client_id=[ClientID]&client_secret=
[ClientSecret]&username=[username]&password=[password]
3
SailPoint
IdentityIQ is an identity and access management solution from SailPoint.
User accounts and roles created in IdentityIQ can be imported and managed in BeyondInsight.
Overview
The following illustrations show the use cases for SailPoint and BeyondInsight.
The first use case imports SailPoint user groups (based on SailPoint roles) in to BeyondInsight.
The second use case, sends and synchronizes permissions in BeyondInsight to IdentityIQ.
4. Select a SailPoint role from the list that you want toimport.
The user accounts will be imported from SailPoint. You can then log on as these users in BeyondInsight and
Password Safe using their Active Directory credentials.
Viewing Permissions in IdentityIQ
The second way to view this data is by finding the user you are interested in:
1. Select the Define tab, and then select Identities.
2. Enter the user name in the filter criteria box and sear
3. Click the user name to view details.
4. Select the Application Accounts tab.
5. Look for the BeyondInsight application and click the arrow next to it. You will see the BeyondInsight
specific attributes for this user.
6. Now that you can access the user specific data, clicking on any of the roles the user is associated with
under
7. BeyondInsight’s attributes will open a pop-up displaying more information.
8.
9. Navigating to the Object properties tab will display its permissions query which will display all
10. of BeyondInsight’s PAM permission data.
ABOUT BEYONDTRUST
BeyondTrust gives organizations the visibility and control they need to reduce risk,
achieve compliance objectives, and boost operational performance. We are trusted by
20,000 customers, including half of the Fortune 500, and a global partner network.
Learn more at www.beyondtrust.com