Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Below is a summary of possible KIM Integration models that were gleaned from presentations and discussions with implementors at the Kuali Days VIII conference: Image Added

KIM Integration Model

Pros

Cons

#1 (Internal DB)

  • Out of box implementation
  • No custom KIM service implementation
  • No IDM integration
  • Must re-enter all person identity manually
  • Must manually keep identity data synchronized

#2 (Data feed)

  • Authoritative IDM source data is utilized
  • No custom KIM service implementation
  • Must create a synchronization/push process
  • Delay is source data propagation

#3 (Service - LDAP backed)

  • Real-time data currency
  • Authoritative IDM source data is utilized
  • Custom KIM service implementation
  • LDAP data source must make all attributes available
  • Requires good performing LDAP service
  • Introduces external dependency for real-time data access

#4 (Service - DB backed)

  • Real-time data currency
  • Authoritative IDM source data is utilized
  • Custom KIM service implementation
  • Database data source must make all attributes available
  • Requires good performing database service
  • Introduces external dependency for real-time data access

...