IdentityForge Integration with SailPoint IdentityIQ

Published December 6, 2018
IdentityForge Integration with SailPoint IdentityIQ Image

Insight summary and table of contents

Summary

Contents

Mainframe applications continue to run significant business processes, and IBM RACF remains the preferred mainframe security system.

Creating users and providing them access into mainframe applications (aka User Provisioning) is done either manually, or using an identity management system like SailPoint IdentityIQ.

However, certifying access to specific data in mainframe systems is a challenge. Specifically, business managers need to view the users and the mainframe dataset(s) that they have access to. Managers also need the ability to revoke or restrict users’ access to certain datasets.

IdentityForge integration with SailPoint IdentityIQ solves this specific use case. Using this integration it’s possible for managers to view the mainframe datasets and the users who have access to it. And, if there is any inappropriate access, the manager can revoke the access in real time.

Certification 0001A 300x188 1
This integration also enables a user to login to SailPoint and request access to mainframe datasets:

SailPoint request dataset ADCDA to 00123 300x188 1
This is accomplished using IdentityForge and out-of-box SailPoint IdentityIQ LDAP Connector. This may sound simple, but it’s a tough problem to solve primarily because when a user is listed in RACF, it’s not possible to list the datasets the user has access to. Instead, one needs to list all the mainframe datasets and search for the specific user in those datasets. This is almost like finding a needle in a haystack.

IdentityForge and SailPoint integration solve this issue using two unique capabilities:

  1. IdentityForge can determine the list of users having access to a dataset, and
  2. SailPoint LDAP connector ability to searches datasets to determine users’ memberships to datasets during account aggregation

How It Works

Below are technical details with step by step process to accomplish the integration. This is done using IdentityForge 6.2 and SailPoint IdentityIQ 7.2p2.

Step 1: Configure OpenLDAP connector in SailPoint IdentityIQ
Configure Connector 300x188 1

Step 2: Configuration Settings
Configuration Settings 300x188 1

Step 3: Define Account Schema
Account Schema 300x174 1

Step 4: Define Group Schema
Group Schema 300x152 1

Step 5: Define Dataset Schema
Dataset Schema 300x160 1

Step 6: Account Settings
Account Settings 300x71 1

Step 7: Group Membership Scope (for Account)
Group Membership Account 300x70 1

Step 8: Group Settings
Group Settings 300x75 1

Step 9: Save the application

Step 10: Define the Account Aggregation Task. Be sure to ‘Promote Managed Attributes’
Promote Managed Attributes 300x13 1

Step 11: Define the Group Aggregation Task

With above changes it should now be possible to see all the RACF Groups and RACF Datasets in the SailPoint Entitlement Catalog:
Entitlement Catalog 300x188 1

It should now be possible to view a RACF account and the RACF Groups and Datasets connected to it e.g. below are the details for a RACF account ‘Pioneer Started Task’ in my environment. Note the attributes ‘RACF Groups’ and ‘mainframeDatasets’:
Pioneer Details 300x188 1

Certification
Now it is possible to conduct certification of mainframe datasets. Note: you might have to execute SailPoint ‘Refresh Entitlement Correlation’ task. Below are the screenshots from my environment:

In RACF, the user ‘0001A’ has access to dataset ‘ADCDA.*’:
RACF Pre Cert Dataset ADCDA 1 300x226 1RACF Pre Cert Dataset ADCDA 2 300x228 1

Revoking access of user ‘0001A’from dataset ‘ADCDA.*’ from SailPoint:
Certification 0001A 300x188 1

As a result, in RACF, the user ‘0001A’ no longer has access to dataset ‘ADCDA.*’:
RACF Post Certification Dataset ADCDA 300x227 1

Requesting Access to Dataset
From SailPoint, it’s now possible to request access to mainframe datasets. Refer to screenshots below.

In SailPoint requesting access to dataset ‘ADCDA.*’ for user ‘00123’:
SailPoint request dataset ADCDA to 00123 300x188 1

In RACF, the user ‘00123’ now has access to dataset ‘ADCDA.*’
RACF access to 00123 to dataset ADCDA 2 300x227 1