This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Community Blog

Subscribe to the official SecurID Community blog for information about new product features, industry insights, best practices and more.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Blogs
  • :
  • SecurID Cloud Authentication Service Transitions Identity Source Synchronization from Scheduled Sync...

SecurID Cloud Authentication Service Transitions Identity Source Synchronization from Scheduled Synchronization to Just-in-Time (JIT) Synchronization

bschussler
Contributor bschussler Contributor
Contributor
0 0 971
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Email to a Friend
  • Printer Friendly Page
  • Report Inappropriate Content
‎2021-08-31 06:08 PM

Overview

Users need to be synchronized from identity sources (Active Directory or LDAP) to the SecurID Cloud Authentication Service (CAS) before registering a SecurID authenticator (such as an OTP hardware token, authenticator app, or a FIDO security key).  Relying on scheduled synchronization could prevent a new user from registering their authenticator(s) for hours or days depending on an organization's configured synchronization interval - generating expensive tech support calls and user frustration.

Additionally, if a CAS tenant is using passwordless authentication (for example, OTP only or FIDO only), a user that is disabled or deleted in the identity source would have a window of time when they can still authenticate successfully in SecurID - basically until the next scheduled synchronization task has completed.

Just-in-time (JIT) synchronization keeps identity source information in SecurID up-to-date by synchronizing each user’s information from the identity source anytime they interact with SecurID. New users are added, existing user are updated, (including being disabled), based on their current status in the identity source(s). New employee hires or new consumer users are instantly enabled, while former employees / consumer users attempting to authenticate are blocked and marked for automatic deletion.

In addition to the eliminating delays in onboarding and offboarding users, JIT also reduces the costs of scheduled synchronization: extra load on identity sources, higher network bandwidth usage, and unnecessary CAS tenant utilization, and in the future, SecurID licenses.

SecurID introduced JIT as a synchronization option in August 2017. Beginning with the September 2021 CAS release, JIT will always be enabled for all SecurID customers, and the option to perform scheduled synchronization will be removed.

NOTE: It will still be possible for administrators to manually perform a synchronization, if one is needed, even after scheduled sync is removed in September.

Keep reading if you'd like more details about how scheduled sync and JIT sync operate.

 

Scheduled Synchronization

Since its launch, the SecurID Cloud Authentication Service (CAS) has supported scheduled, full synchronization of all users in identity sources (Active Directory or LDAP) on a daily, weekly, or monthly basis. When a user was added to an organization identity source, the user could register for the authenticator type(s) enabled by an administrator only after the identity source to SecurID scheduled synchronization task was complete.  

The wait for a scheduled synchronization task could prevent a new user from registering and using their SecurID authenticator for hours or days depending on the configured syncing interval. In addition to the poor user experience, seeing an error message when trying to register generates technical support calls. If an individual user was added or removed from identity source group(s) that granted or removed access to applications, the user's access changes would also be delayed by the syncing schedule. 

Additionally, if a CAS tenant contains authentication policies that do not require a password (for example OTP only or FIDO only), a user who is disabled or deleted in the identity source would have a window of time during which they are able to successfully authenticate - basically until the next scheduled synchronization task was complete.

Besides potentially delaying the onboarding of new users and disabling former users, full synchronization can also be expensive in terms of directory server load, network bandwidth, and CAS tenant performance.  A full synchronization, either scheduled or manually invoked, performs all of the following tasks:

  1. A directory lookup of all users specified in the User Search Filter (the subset of users that need SecurID).
  2. Copies the specified attributes of all selected users to the identity router, then transmits that information to SecurID.
  3. After receiving the user information, SecurID performs the following operations on every user from the identity source(s) that matched the User Search Filter:
    1. Adds the user to SecurID if the user doesn't already exist.
    2. Updates the attributes of all existing users in SecurID if there were changes from the identity source (for example group memberships or email address).
    3. Disables the user in SecurID if disabled in the identity source (the user can no longer authenticate).
    4. Schedules the user for deletion in SecurID if no longer present in the identity source (immediately the user can no longer authenticate, all SecurID credentials are scheduled for deletion when user is deleted).

When the full synchronization User Search Filters on the identity source aren’t or can’t be specific enough, a full sync may add many users to SecurID that don’t require a SecurID authenticator, clogging up the CAS tenant and unnecessarily consuming SecurID licenses. (In the future, there will be licensing model changes where all users added to CAS will be counted against licensing, not only those users actively authenticating.)

 

Just-in-Time (JIT) Synchronization

To address the issues with a full synchronization and make CAS more real-time, just-in-time (JIT) synchronization was released in August of 2017. It is designed to keep identity source information in SecurID up-to-date by synchronizing the user’s information from the identity source anytime a user interacts with SecurID.

After a new user is added to an identity source, as soon as the user tries to register a SecurID authenticator, configured attributes are immediately synced into SecurID so the user can register and authenticate with SecurID. Additionally, JIT will refresh user attributes from the identity source every time the user attempts to authenticate using any authentication method in SecurID, so a user disabled in the identity source will be prevented appropriately from accessing any SecurID-protected resource. A deleted user is disabled and scheduled for deletion in SecurID, after a  grace period (90 day default, admin configurable). This grace period exists in the event a user should not have been deleted or an admin incorrectly configures the identity source User Search Filters, so that users don’t need to re-register all their authenticators.

JIT sync does not automatically schedule users for deletion in SecurID if those users:

  • Never try to authenticate in SecurID after they have been deleted from an identity source.
             OR
  • Never registered an authenticator in SecurID or otherwise attempted to use it.  This affects users who were added to SecurID via a scheduled synchronization or when an admin manually triggered synchronization.


A solution for this is coming. In the future, CAS will introduce a user cleanup feature that automatically marks users for deletion under the following circumstances:

  • The user hasn't authenticated for a while in SecurID and is no longer present in an identity source.
  • The user has no registered SecurID authenticators and has never authenticated with SecurID (even if the user is in a connected identity source). This user should never should have been added to SecurID, they were probably created by an overly permissive User Search Filter during a full synchronization of an identity source.

 

Synchronization Feature Rollout Timetable in CAS

Date

Event

August 2017

JIT Synchronization feature added to CAS

week of July 12, 2021

JIT Synchronization was enabled for all CAS tenants. It is possible to temporarily disable JIT in a tenant if there are any problems.

Week of August 9, 2021

Scheduled Full Synchronization was disabled for all CAS tenants. It is possible to temporarily re-enable scheduled synchronization if disabling it caused any problems.

September 2021

The settings to enable/disable Scheduled Synchronization and JIT Synchronization will be removed. JIT sync will be permanently enabled and scheduled full sync will be removed from the product.

TBA

Automatic user cleanup in CAS

 

NOTE: It will still be possible for an administrator to manually perform a full synchronization if one is needed even after scheduled sync has been removed in September.

Tags (5)
  • Tags:
  • Cloud Authentication Service
  • RSA SecurID
  • SecurID
  • SecurID Access
  • SecurID Cloud
0 Likes
Share

You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.

  • Comment
Latest Articles
  • In the era of Hybrid Work – SecurID macOS Authenticator is here!
  • SecurID Cloud Authentication Service Transitions Identity Source Synchronization from Scheduled Sync...
  • SecurID JUNE Release Accelerates RSA Cloud First Strategy
  • Introducing the New SecurID™ App 3.0 for iOS® and Android™
  • Stronger, Simpler and Better – 3 Reasons on choosing SecurID® for Passwordless Windows log-in
  • Defense-in-Depth: RSA SecurID® Access in November 2020
  • Protect Stormshield VPN with RSA MFA
  • Optimize your Dynamic Workforce with RSA SecurID Access
  • Securing access to corporate endpoints is made easy with RSA MFA Agent 2.0.1 for Microsoft Windows
  • New RSA SecurID Access & Authentication Manager Training – Your commute hours have never been so pro...
Labels
  • Announcements 3
  • Features 1
  • Resources 1
  • Tutorials 27
  • Use Cases 3
  • Videos 93
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.