Techniques for managing SCIM-compliant systems
First Claim
Patent Images
1. A method comprising:
- receiving, by a management system, a request to initiate a connector for each of a plurality of target systems, wherein each of the plurality of target systems are System for Cross Domain Identity Management (SCIM) compliant or a customization of SCIM;
for each of the plurality of target systems;
connecting, by an instance of the connector, to a target system, wherein each of the plurality of target systems has a different instance of the connector;
obtaining, by the instance of the connector, information regarding the target system; and
storing, by the instance of the connector, the obtained information;
receiving, by the management system, a first request to perform an operation on each of the plurality of target systems, wherein the operation is associated with modifying, creating, deleting or querying an account on the target system of the plurality of target systems;
for each of the plurality of target systems;
identifying, by the management system, a particular instance of the connector that corresponds to the target system;
creating, by the particular instance of the connector, a second request to perform the operation on the target system, wherein the second request corresponds to the first request, and wherein the second request is consumable by the target system based on the obtained information; and
sending, by the particular instance of the connector, the second request to the target system, wherein receipt of the second request by the target system causes the target system to perform the operation.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure describes techniques for using instances of a connector to communicate with multiple target systems without a manual pre-configuration step for each of the multiple target systems. The connector may be an extensible program-code-template for creating objects to perform one or more operations. For example, each instance of the connector may obtain information regarding a corresponding target system, determine an interface to the corresponding target system based on the information, and translate requests for the corresponding target system according to the interface.
13 Citations
17 Claims
-
1. A method comprising:
-
receiving, by a management system, a request to initiate a connector for each of a plurality of target systems, wherein each of the plurality of target systems are System for Cross Domain Identity Management (SCIM) compliant or a customization of SCIM; for each of the plurality of target systems; connecting, by an instance of the connector, to a target system, wherein each of the plurality of target systems has a different instance of the connector; obtaining, by the instance of the connector, information regarding the target system; and storing, by the instance of the connector, the obtained information; receiving, by the management system, a first request to perform an operation on each of the plurality of target systems, wherein the operation is associated with modifying, creating, deleting or querying an account on the target system of the plurality of target systems; for each of the plurality of target systems; identifying, by the management system, a particular instance of the connector that corresponds to the target system; creating, by the particular instance of the connector, a second request to perform the operation on the target system, wherein the second request corresponds to the first request, and wherein the second request is consumable by the target system based on the obtained information; and sending, by the particular instance of the connector, the second request to the target system, wherein receipt of the second request by the target system causes the target system to perform the operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium storing a plurality of instructions executable by one or more processors, the plurality of instructions when executed by the one or more processors cause the one or more processors to perform processing comprising:
-
receiving, by a management system, a request to initiate a connector for each of a plurality of target systems, wherein each of the plurality of target systems are System for Cross Domain Identity Management (SCIM) compliant or a customization of SCIM; for each of the plurality of target systems; connecting, by an instance of the connector, to the target system, wherein each of the plurality of target systems has a different instance of the connector; obtaining, by the instance of the connector, information regarding the target system; and storing, by the instance of the connector, the obtained information; receiving, by the management system, a first request to perform an operation on each of the plurality of target systems, wherein the operation is associated with modifying, creating, deleting or querying an account on a target system of the plurality of target systems; for each of the plurality of target systems; identifying, by the management system, a particular instance of the connector that corresponds to the target system; creating, by the particular instance of the connector, a second request to perform the operation on the target system, wherein the second request corresponds to the first request, and wherein the second request is consumable by the target system based on the obtained information; and sending, by the particular instance of the connector, the second request to the target system, wherein receipt of the second request by the target system causes the target system to perform the operation. - View Dependent Claims (14, 15, 16)
-
-
17. A system comprising:
-
one or more processors; and a non-transitory computer-readable medium including instructions that, when executed by the one or more processors, cause the one or more processors to; receive a request to initiate a connector for each of a plurality of target systems, wherein each of the plurality of target systems are System for Cross Domain Identity Management (SCIM) compliant or a customization of SCIM; for each of the plurality of target systems; connect, by an instance of the connector, to the target system, wherein each of the plurality of target systems has a different instance of the connector; obtain, by the instance of the connector, information regarding the target system; and store, by the instance of the connector the obtained information; receive a first request to perform an operation on each of the plurality of target systems, wherein the operation is associated with modifying, creating, deleting or querying an account on a target system of the plurality of target systems; for each of the plurality of target systems; identify a particular instance of the connector that corresponds to the target system; create, by the particular instance of the connector, a second request to perform the operation on the target system, wherein the second request corresponds to the first request, and wherein the second request is consumable by the target system based on the obtained information; and send, by the particular instance of the connector, the second request to the target system, wherein receipt of the second request by the target system causes the target system to perform the operation.
-
Specification