sb-nz logo
Story image

Thycotic rolls out SCIM Connector for expanded user access integration

16 Jul 2020

Privileged access management solutions provider Thycotic has announced general availability of System for Cross-domain Identity Management (SCIM) Connector 2.0, which allows expanded integrations between identity providers and Secret Server.

Thycotic states that many organisations use a combination of privileged access management (PAM) and identity governance administration (IGA) solutions that do not integrate with each other, resulting in a lack of unified identity view and lack of visibility.

According to the company, SCIM Connector 2.0 allows the automation and interoperability of user access. IT teams get full visibility into user access and role assignments as well as ongoing user and role changes. 

The company says such changes can improve security across the organisation, streamline delivery of privileged access to improve both end user and IT productivity, and they can also optimise PAM across the enterprise.

Thycotic explains that SCIM Connector 2.0 allows organisations to set up workflows to synchronise, provision or modify entitlements in Secret Server directly within their IGA platform. 

Furthermore, The SCIM Connector is installed as a web application and allows users to input credentials and a URL path to connect directly to Secret Server. It also allows users to connect Secret Server to one or multiple standard SCIM endpoints. 

Thycotic vice president of product management Jai Dargan explains, “Leveraging the SCIM 2.0 Connector helps bridge disparate PAM and IGA implementations, giving security teams greater visibility and control of privileged accounts across the enterprise. 

“The SCIM specification, which the Thycotic connector utilises, makes managing user identities in cloud-based applications and services easier. It reduces the cost and complexity of user management operations by providing a common user schema and extension model, as well as binding documents to provide patterns for exchanging this schema using standard protocols.” 

SCIM Connector 2.0 expands the identity providers with which Secret Server can integrate, including Microsoft Identity Manager, Oracle Identity Manager, Oracle Identity Cloud Service, and Salesforce.

Thycotic also recently announced the appointment of Asia Pacific strategic alliance director Kris Hansen. Hansen is now responsible for managing the company’s Asia Pacific network of distributors and reseller partners. His goal in his new role is to enable every major systems integrator (SI) and managed service provider (MSP) in the region to offer PAM-as-a-service to customers.

“Thycotic solves a key problem that the security market could not address for many years. Our PAM solutions can be deployed as a service, hosted, in the cloud, or on premises. Where you keep your secure password vault and how you manage your password security is highly flexible,” says Hansen.

Story image
Protegrity rolls out updates to data protection platform
Protegrity has updated its Protegrity Data Protection Platform to better secure sensitive data in hybrid-cloud, multi-cloud and SaaS environments.More
Story image
Digital payments fuelling fraud surge during COVID crisis
Digital payments are fuelling a multibillion-dollar fraud surge worldwide.More
Story image
Gartner reveals the top strategic tech trends for 2021
“CIOs are striving to adapt to changing conditions to compose the future business - this requires the organisational plasticity to form and reform dynamically. Gartner’s top strategic technology trends for 2021 enable that plasticity.”More
Story image
Interview: How cyber hygiene supports security culture - ThreatQuotient
We spoke with ThreatQuotient’s APJC regional director Anthony Stitt to dig deeper into cyber hygiene, security culture, threat intelligence, and the tools that support them.More
Story image
Why IT and HR must work together to help businesses weather the storm
Employers are striving to balance team productivity, security and employee engagement. If remote work is the new norm, it’s impossible to ignore the challenging nature of the situation, writes Gigamon manager for A/NZ George Tsoukas.More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More