sb-au logo
Story image

Thycotic rolls out SCIM Connector for expanded user access integration

16 Jul 2020

Privileged access management solutions provider Thycotic has announced general availability of System for Cross-domain Identity Management (SCIM) Connector 2.0, which allows expanded integrations between identity providers and Secret Server.

Thycotic states that many organisations use a combination of privileged access management (PAM) and identity governance administration (IGA) solutions that do not integrate with each other, resulting in a lack of unified identity view and lack of visibility.

According to the company, SCIM Connector 2.0 allows the automation and interoperability of user access. IT teams get full visibility into user access and role assignments as well as ongoing user and role changes. 

The company says such changes can improve security across the organisation, streamline delivery of privileged access to improve both end user and IT productivity, and they can also optimise PAM across the enterprise.

Thycotic explains that SCIM Connector 2.0 allows organisations to set up workflows to synchronise, provision or modify entitlements in Secret Server directly within their IGA platform. 

Furthermore, The SCIM Connector is installed as a web application and allows users to input credentials and a URL path to connect directly to Secret Server. It also allows users to connect Secret Server to one or multiple standard SCIM endpoints. 

Thycotic vice president of product management Jai Dargan explains, “Leveraging the SCIM 2.0 Connector helps bridge disparate PAM and IGA implementations, giving security teams greater visibility and control of privileged accounts across the enterprise. 

“The SCIM specification, which the Thycotic connector utilises, makes managing user identities in cloud-based applications and services easier. It reduces the cost and complexity of user management operations by providing a common user schema and extension model, as well as binding documents to provide patterns for exchanging this schema using standard protocols.” 

SCIM Connector 2.0 expands the identity providers with which Secret Server can integrate, including Microsoft Identity Manager, Oracle Identity Manager, Oracle Identity Cloud Service, and Salesforce.

Thycotic also recently announced the appointment of Asia Pacific strategic alliance director Kris Hansen. Hansen is now responsible for managing the company’s Asia Pacific network of distributors and reseller partners. His goal in his new role is to enable every major systems integrator (SI) and managed service provider (MSP) in the region to offer PAM-as-a-service to customers.

“Thycotic solves a key problem that the security market could not address for many years. Our PAM solutions can be deployed as a service, hosted, in the cloud, or on premises. Where you keep your secure password vault and how you manage your password security is highly flexible,” says Hansen.

Story image
Video: 10 Minute IT Jams – A glimpse inside a ransomware cell
This is our second IT Jam with SonicWall senior manager of product marketing Brook Chelmo, and in this video Brook walks us through his one-on-one experience with a member of a ransomware cell. More
Story image
IBM Security completes industry first with updates to Cloud Pak for Security solution
"With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity."More
Story image
Research: Younger cybersecurity pros more fearful of being replaced by AI
According to the findings, 53% of respondents under 45 years old either agreed or strongly agreed that AI and ML are a threat to their job security, despite 89% of this demographic believing that it would improve their jobs.More
Story image
Lumen launches managed security services for APAC market
The new service is designed to provide enterprise businesses with a proactive, connected security strategy to enhance threat detection and protection across endpoints. More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More