Identities (users)

In identity management an identity is a set of informations that describes a real person. Some of the information like First Name, Last Name, Login or Password are crucial for many IT systems, since they process them, or e.g. use them for authentication or authorization. Identity management systems process the data about identity, transform them and use them to manage accounts on connected systems.

 Identity in identity management

The representation of a user in CzechIdM system is an entity called identity. Put simply, an identity can be described as a user registered in CzechIdM with all his attributes e.g. first name, surname, phone number, etc. The identity representation is rather complex discipline. To be able to handle automatic identity lifecycle processes CzechIdM presents other entities with attributes that have a relation to an identity. Those are Contracts, Roles and Tree nodes forming Tree strucures.

 Entities relations

The relation of identities in CzechIdM with a company or organization is represented by an entity called contract. A contract can be imagined as:

  • job contract for work – employees
  • study – pupils/students
  • contract/arrangement – external co-workers
  • etc.

A user can have many contracts. A contract is in relation with other objects in CzechIdM:

  • Identity – described above
  • Tree structure – a contract can be added to a tree (organizational) structure, which effectively allows integrating the user into a hierarchical division in an organization.
  • Roles – roles in CzechIdM are assigned to contracts, i.e. a user gets roles through their contracts. Due to this, all manually created identities can (application option) have one automatically prepared contract called Default.
Every active user should have their contract. Via contracts Roles are assigned to users and users are placed into Tree structure (working position)

Identity life cycle is controlled by state. State is changed automatically by system - when identity is created, contract to identity is added or removed etc.

Identity states:

  • created - identity is enabled. State is assigned to newly created identity.
  • no contract - identity is disabled. Identity doesn't have a contract. All contract were deleted.
  • future contract - identity is disabled. Identity has valid contract in the future, but not now.
  • valid - identity is enabled. Identity has valid contract.
  • left - identity is disabled. Identity has invalid contracts only.
  • excluded (~disabled) - identity is exclued (disabled). Identity contracts are excluded (assigned roles are not removed, when identity is excluded).
  • disabled manually - identity is disabled manually, e.g. by administrator / synchronization. Manually disabled identity can be enabled manually only again (assigned roles are not removed, when identity is disabled manually).

When identity starts to be valid (some of their contract starts to be valid) and identity has account at least on one target system, then new password is generated and changed on all identity's accounts ⇒ identity will have the same password in all accounts. Notification (see acc:newPasswordAllSystems template) is send to identity about new password on which accounts were changed.

In CzechIdM is user password stored in Bcrypt hash function. User can change password only when own permission IDENTITY_PASSWORDCHANGE for the given identity. Password contains also another metadata like valid till, valid from, unsuccessful attempts, block login date, last successful login and etc. For password is also possible set flag Password never expires. This flag disable filling valid till. Password never expires and another attributes for password like valid till, is possible set via agenda information about password that is accessible via identity detail and password agenda. For update these attributes you will need permission PASSWORD_UPDATE and PASSWORD_READ

Time slices of contracts

On many projects, we encounter a source of data about users, employees or org. structures that work with so-called time slices. For better works with this time slots, agenda of contract's time slices was created.

The basic idea is that time slices are stored in a self-contained agenda. This agenda only contains time slices for identity contracts. If a given slice is currently valid, its values will be copied into the linked identity contract. Every day a scheduled task is performed, which calculates whether another slice is valid. Such a slice becomes currently used as a contract (its values are copied into the contract).

In one day can exists only one slice for one contract. Every slice must contains all data of the contract. Slice is snapshot of the contract!

More information about contract time slices you can find in the develop guide here .

Protection of the contract validity

Sometimes there may be a situation where one of the time slices ends the contract, and at the same time there is a next time slice that restarts this contract. If there is no gap between termination and restart, then the contract will not terminate (no accounts will be deleted). If the dates do not follow, then (by default) will be contract terminated and all connected accounts will be removed from the target systems.

However, in some situations (projects), it is required to use the protection period for which the contract will not be terminated, provided that there is a next slice in the contract, which restarts the contract. Furthermore must be ensured that the gap between the termination and the beginning of the contract is less than or equal to the protection interval.

More information about this protection you can find in the develop guide here .

Read more