Overview
  • 31 Aug 2023
  • 1 Minute to read
  • Dark
    Light
  • PDF

Overview

  • Dark
    Light
  • PDF

Article summary

Connectors function as intermediary components or modules connecting the Cross Identity Solution to the target application. These connectors facilitate communication between Cross Identity and endpoint systems. They employ various protocols to establish connections, including:

  1. System for Cross-domain Identity Management (SCIM) 
  2.  File Transfer Protocol (FTP)
  3.  Representational State Transfer (REST) 
  4.  Subjective, Objective, Assessment and plan (SOAP) 
  5.  Java Database Connectivity (JDBC) 
  6.  Lightweight Directory Access Protocol (LDAP)

The Connector Framework is based on the following principles:

  • Platform Independent: It is platform-independent.
  • Scalable: Optimized for multi-threaded, fully-distributed performance.

Architecture Diagram

The following diagram illustrates the IGA Connector flow:


Was this article helpful?