【Lightweight Identity Management System 轻量级用户体系设计方案】
本文主要是介绍【Lightweight Identity Management System 轻量级用户体系设计方案】,对大家解决编程问题具有一定的参考价值,需要的程序猿们随着小编来一起学习吧!
Lightweight Identity Management System 轻量级用户体系设计方案
LIMS Design Notebook
【Section 1】Application ARCHITECTURE
LEVEL 1: Monolithic Architecture
LEVEL 2: Vertical Architecture
LEVEL 3: SOA Architecture
LEVEL 4: Microservice Architecture (MSA)
Architecture Consistency
【Section 2】QUICK START
FUNCTIONALITY
【Section 3】SSO MANAGEMENT
Enable / Disable SSO
Create Resource Directory
Modify Resource Directory
Associate SSO with Authorization
【Section 4】USER MANAGEMENT
1. Basic Support
2. Sign In Settings
3. 2FA/MFA Management
【Section 5】ORGANIZATION MANAGEMENT
1. Basic Support
【Section 6】EXTERNAL IDENTITY MANAGEMENT
1. SCIM (System for Cross-Domain Identity Management) Synchronization
2. SSO (Single-Sign-On)
【Section 7】ACCESS CONTROL
1. Overview
2. Create
3. Modity
4. Authorization Management
5. Client Access Types
【Section 8】AUTHORIZATION MANAGEMENT
1. Manage Multi-Account Authorization
2. Resource Account Authorization
3. Deployment of Access Configurations
【Section 9】SIGN IN MANAGEMENT
1. Sign In from The Portal, and Access Resources
2. Sign In by CLI, and Access Resources
【Section 10】BEST PRACTICES
1. API Calling
2. Common Parameters
3. Service Management
【Section 11】SSO References
Popular B/S-Architecture SSO Protocols
1. CAS 3.0
2. OAuth 2.0
3. OIDC (OpenID Connect) 1.0
4. SAML 2.0
LIMS Design Notebook
【Section 1】Application ARCHITECTURE
LEVEL 1: Monolithic Architecture
Codes are developed and maintained within a single application.
LEVEL 2: Vertical Architecture
Tiered application. Mostly use the MVC mode (a 3-tier simple architecture mode).
Key Words: Veritically Tiered, Load Balancing.
LEVEL 3: SOA Architecture
Build the cloud computing ecology for an enterprise. Services are provided to the other components by distributed and reusable application components.
Service behaviors are predictable.
Services are defined by platform-neutral interface contract.
Key Words: RPC, Frontend and Backend Split, Caching, Middleware, Full-Text-Search.
LEVEL 4: Microservice Architecture (MSA)
System consists of a group of microservices in separate processes. Communication between microservices uses HTTP resource APIs (lightweight).
Key Words: Split Business and Database, Service Governance and Monitoring, Distributed Caching.
Architecture Consistency
Meet requirements in Open-Source, Internal Ecology, Business scenarios.
【Section 2】QUICK START
FUNCTIONALITY
USER & GROUP MANAGEMENT
SIGN IN & SIGN ON
ACCESS CONTROL
AUTHORIZATION
ACCESS MANAGEMENT
【Section 3】SSO MANAGEMENT
Enable / Disable SSO
Create Resource Directory
Modify Resource Directory
Associate SSO with Authorization
【Section 4】USER MANAGEMENT
1. Basic Support
Create
Show
Modify
Enable / Disable
2. Sign In Settings
Only ONE of the following options is available at the same time.
Username / Password
SSO
3. 2FA/MFA Management
Enable / Disable
Delete 2FA/MFA Device
【Section 5】ORGANIZATION MANAGEMENT
1. Basic Support
Create
Show
Modify
Add / Remove User(s)
【Section 6】EXTERNAL IDENTITY MANAGEMENT
1. SCIM (System for Cross-Domain Identity Management) Synchronization
Goal: Standard Multi-Tentant Cloud Application / Service Identity Management
Requirement: To synchronize users / groups from the enterprise IdP.
Steps
Create SCIM key; Enable SCIM Synchronization from the console.
Add / Remove User(s) / Group(s) to / from the application.
Set up the Enterprise IdP Synchronization in the application.
Verification: Sign in the system console. View the list of users / groups that has the successful synchronization (source is marked as ‘SCIM Synchronization’).
Keys Management
Each account has at most a limit number of SCIM keys.
Operations: Create, Enable / Disable, Delete.
Enable / Disable SCIM Synchronization
SCIM 2.0 Object Model
All objects MUST be inherited from the Resource.
Official Models: Resource, User, Group, Enterpriseuser
Scenarios
Identity Migration from one Cloud Provider to the other
apply SCIM on all stakeholders, i.e., User and Cloud Provider(s)
SSO between trusted applications running in different Cloud Providers
Identity Management: SaaS for a Global Commity
Identity Settings
Dispatch Info
User Attributes Transferred between Trusted Websites based on Authorization Protocol (OAuth, SAML, etc)
Change Notifications to Website, Requests for change(s) update (caches) issued at desired time to Directory