Workspace ONE and Azure AD: Part 1

Opening Often times when working with customers, I get the impression that there is a strong sense of confusion when discussing the integration of a platform such as Microsoft 365 with 3rd party ecosystems. After all, an investment in M365 comes with many features and functions, so where do platforms like Workspace ONE fit in? My friends, welcome to my day job and one true passion in life. Remember the saying, “do what you love and you’ll never work a day in your life.” This mini-series is aimed at breaking down the often encountered silos so that you can articulate and deliver a best-in-class end user experience using the analogous functions from two best-in-class platforms: Workspace ONE and Azure AD. We’ll briefly cover the major use cases of stitching these two ecosystems together, and why this fabric is critical to adoption and value realization. Note to reader: The scope of this mini-series will be limited to what you are capable of doing with these platforms today. The partnership announcement will most certainly have a positive impact on the below, and […]

WS1 UEM SCIM Adapter

Today is an exciting day. It’s my first experience developing a VMware Fling, and it’s is the GA release of what Joe Rainone and I put hours of laborious love into. Identity is not only our day job, but also an area that we are both very passionate about. Our belief is that this Fling, while unsupported, answers a question that many of our customers ask when designing production Workspace ONE deployments. Take a look, play around, and please provide feedback here! What is the Fling about? The SCIM protocol is quickly modeling after what SAML brought to identity management almost 15 years ago: a common way to establish resource identity in a service-to-service architecture. Gone are the days where LDAP and Active Directory are the primary systems of record. This concept is particularly enhanced as EUC platforms like Microsoft Azure, VMware Workspace ONE, and others provide native directory services while maintaining a common identity among themselves and their relying parties. Furthermore, the burden of maintaining ‘connector’-like infrastructure for the sole purpose of identity synchronization not only diminishes the value […]