Axiad enables customers to move to a passwordless future without the friction and risk of fragmented solutions. By addressing authentication holistically, regardless of underlying IT complexity, organizations can vastly improve their cybersecurity posture.
Please refer to our website for more information about Axiad.
Axiad SCIM Connector enables automatic provisioning of users and groups between Axiad Cloud and ForgeRock using the secure and standard protocol, System for Cross-Domain Identity Management (SCIM). The Axiad SCIM connector allows partners to leverage certificate based authentication, which is the most secure, phishing-resistant form of multi-factor authentication (MFA) and is being increasingly deployed in enterprises as well as the public sector. Many enterprise employees, as well as the majority of federal agencies and defense employees/contractors, use a strong authenticator such as a smart card or hardware device for authentication. CBA streamlines the process of authenticating users with a variety of authenticators while improving overall protection.
Axiad provides this SCIM Connector as a starting point for integrating ForgeRock and Axiad Cloud. Since every ForgeRock implementation is different we have provided a basic mapping of ForgeRock attributes for SCIM provisioning. Your organization's implementation may have differences which will require updates to ensure the SCIM Connector works properly.
Your Axiad SCIM Connector may also not require all the attributes that are described below or your ForgeRock implementation may not have all the data populated for all attributes listed. The SCIM attribute mapping will need to be updated as appropriate for your data and business requirements.
Please work with Axiad Customer Success before implementing a SCIM connector as they will need to provide an attribute list and credentials for your Axiad Cloud tenant.
- ForgeRock Identity Management (OpenIDM) 7.3.0 or above
- Axiad Cloud tenant
- Axiad Cloud tenant available attribute list
- Axiad Cloud tenant SCIM credentials
- Appropriate Axiad SCIM connector configuration files
If your Axiad Cloud tenant is already configured with the required mappings attribute there is no additional Axiad configuration needed. If assistance is needed with your Axiad Cloud environment to configure SCIM, please contact Axiad Customer Success.
- Get the latest SCIM Connector configuration and mapping file from the Axiad Customer Success team.
- Copy the
provisioner.openicf-AxiadSCIMConnector.json
file into theconf
directory where ForgeRock Identity Management is deployed. - If the
sync.json
file exist in theconf
directory, copy the contents ofmapping-AxiadSCIMConnector.json
in the mappings array inside theconf\sync.json
file. If thesync.json
file doesn't exist, copy the sync.json file to theconf
directory.
Log into the ForgeRock Identity Management console
Click
CONFIGURE
on the menu bar and selectCONNECTORS
. The AxiadSCIMConnector will be available as shownClick on the
Axiad SCIM Connector
3.1. Configure the
SCIM Endpoint
underBase Connector Details
section as shown. If you do not have the SCIM endpoint, please contact Axiad Customer Success3.2. Configure the
Authentication token
under theAdditional Options
section as shown. If you do not have the token please contact Axiad Customer Success3.3. Click on save.
Click CONFIGURE
on the menu bar and select Mappings
. Axiad SCIM mappings will be available as shown
Click on
Edit
where SOURCE isManaged/User
and verify the settings are correct. You should have received a list of supported SCIM attributes from the Axiad Customer Success team. The attribute list Axiad provides includes all attributes mapped within your Axiad Cloud tenant. You must delete all unused attributes from the SCIM mapping to avoid unnecessary data synchronizations.1.1. Verify the
Properties
tab has theAttributes Grid
as shownNote : By default the
Organization
property is mapped to the 1st organization in an array. If this is different than what you expect please change the mapping accordingly.1.2. Verify the
Association
tab has theAssociation Rules
as shown1.2.1. Under
Association Rules
click on thepencil
icon (as highlighted in above image) to verify theCorrelation Query
config as shown1.3. Verify the
Behaviors
tab has thePolicies
as shown1.4. Verify the
Advanced
tab has theAdditional Mapping Options
as shown1.5. Under the
Scheduling
tab, you canAdd Reconciliation Schedule
as per your organization's requirements
Click on
Edit
where SOURCE isManaged/Role
and verify the settings are correct1.1. Verify the
Properties
tab has theAttributes Grid
as shown1.2. Verify the
Association
tab has theAssociation Rules
as shown1.2.1. Under
Association Rules
click on thepencil
icon (as highlighted in above image) to verify theCorrelation Query
config as shown1.3. Verify the
Behaviors
tab has thePolicies
as shown1.4. Verify the
Advanced
tab has theAdditional Mapping Options
as shown1.5. Under the
Scheduling
tab, you canAdd Reconciliation Schedule
as per your organization's requirements
- Click
CONFIGURE
on the menu bar and selectMANAGED OBJECTS
- Click the 'User' managed object
Edit the
manager
propertyUnder
Details
, click onShow advanced options
Enable
Viewable
,User Editable
,Return by Default
and theNotify Self
options as shownEdit the
Relationship Configuration
, highlighted with a red rectangle as shown4.1. Enable
Notify
on theEdit Resource
screen as shown
Edit the
memberOfOrgIDs
propertyUnder
Details
, click onShow advanced options
Enable
User Editable
,Return by Default
and theVirtual
options as shown
- Click
CONFIGURE
on the menu bar and selectMANAGED OBJECTS
- Click the 'Role' managed object
Edit the
members
propertyUnder
Details
, click onShow advanced options
Enable
Viewable
,User Editable
,Return by Default
and theNotify Self
options as shownEdit the
Relationship Configuration
, highlighted with a red rectangle as shown4.1. Enable
Notify
on theEdit Resource
screen as shown
How to validate
User
provisioningCreate a new user in ForgeRock
Wait for few seconds and if the user synchorization between
ForgeRock
andAxiad
is successful, aLinked System
tab will appear in ForgeRock for the new user as shownNavigate to the
Linked System
tabVerify all the mapped attributes for this user have synced to Axiad and are displaying correctly in ForgeRock
How to validate
Role
provisioningCreate a new role in ForgeRock
Wait for few seconds and if the role synchorization between
ForgeRock
andAxiad
is successful, aLinked System
tab will appear in ForgeRock for the new role as shownNavigate to the
Linked System
tabVerify all the mapped attributes for this role have synced to Axiad and are displaying correctly in ForgeRock
Log into the ForgeRock Identity Management console
Click
CONFIGURE
on the menu bar and selectMappings
Click on
Reconcile
where source isManaged/User
as shownVerify the result of reconcilation by clicking the
edit
button on theManaged/User
mapping