There’s been a bit of recent blogging activity about federated provisioning and SPML. Having worked on both federated provisioning and SPML in a past life, it warms my heart to see this discussion. Jackson, quoting the CIO of Education Testing Services, Daniel Wakeman, restates the observation that SaaS providers are providing when it comes to federated identity management. This “major shortcoming” leaves service subscribers to fend for themselves in managing user lifecycle events like on-boarding and off-boarding. Not acceptable.
That got me thinking – there really ought not to be a concept of federated provisioning. Provisioning an application in the data center must be the same as provisioning an application in the cloud. However, in the course of the conversation between James, Jackson, and Mark, it seemed SaaS applications and in-house applications were different from a provisioning perspective.
SaaS applications may be harder to provision and de-provision than non-SaaS application, but that doesn’t make them fundamentally different animals. The point was made that SaaS apps lack a standards-based provisioning interface, an SPML interface. The fact is the vast majority of applications, SaaS or not, lack a standards-based provisioning interface and this makes dealing with them very much the same.
Now there are two reasons that we don’t hear the same short of clamor about provisioning non-SaaS applications as we do with SaaS applications:
- We’ve dealt with it so long that pain isn’t as acute
- Provisioning vendors built an array of connectors, shifting the pain up a level, allowing companies to focus on the provisioning technology and not each and every application they want to provision
Provisioning vendors spent lots of time and money to build connectivity to traditional applications. Lots. And in doing so provided a bit of absolution for application vendors from their failing to provide a standards-based provisioning interface. Having gone through all that pain and suffering, vendors are not eager to go through it again with SaaS applications, coding connectors to each one’s different web service. Customers aren’t too keen on the idea either.
In providing SPML interfaces to their applications, SaaS vendors would do everyone a service. Provisioning vendors could use their SPML connectors and not have to build to each SaaS application. Customers wouldn’t have to write custom code to different service interfaces.
You don’t want that fired sales guy walking away with your customer list no more than you want him walking out the door with your pricing information. To that end, there should be no reason why deprovsioning from an application like Salesforce.com is any harder than deprovisioning from LDAP. Federated provisioning should not exist; there is only provisioning.
(Cross-posted from Burton Group’s Identityblog)