User directory deployment based on user and group policies

ABSTRACT

A cloud network for automatically provisioning a user directory in a multi-tenant system. User attributes for configuration of the user directory and groups associated with a plurality of end-users are received from a local application on an end-user device. A program module integrates with an external application and the user interface allows integration with a mid-link server. User policies and group policies associated with the plurality of end-users are determined. A high-risk user from the plurality of end-users is determined using the external application. A threat is determined associated with an end-user based on a type of the threat, a threat level is determined based on the type of the threat, and the threat level is compared to a threshold level, the threshold level categorizes the end-user as the high-risk user. The user directory is deployed using a snippet based on the user policies and the group policies.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.17/454,764, filed Nov. 12, 2021, the disclosure of which is herebyincorporated by reference herein in its entirety for all purposes.

SUMMARY

In one embodiment, the present disclosure provides a cloud network forautomatically provisioning a user directory in a multi-tenant system.User attributes for configuration of the user directory and groupsassociated with a plurality of end-users are received from a localapplication on an end-user device. A program module integrates with anexternal application and the user interface allows integration with amid-link server. User policies and group policies associated with theplurality of end-users are determined. A high-risk user from theplurality of end-users is determined using the external application. Athreat is determined associated with an end-user based on a type of thethreat, a threat level is determined based on the type of the threat,and the threat level is compared to a threshold level, the thresholdlevel categorizes the end-user as the high-risk user. The user directoryis deployed using a snippet based on the user policies and the grouppolicies.

In an embodiment, a cloud network for automatically provisioning userand group profiles using directory synchronization in a multi-tenantsystem is disclosed. The cloud network includes a local applicationconfigured to execute on an end-user device and a mid-link servercoupled to a plurality of end-user devices. The local application isfurther configured to provide a plurality of user attributes forconfiguration of a user directory. The plurality of user attributesincludes email address, User Principal Name (UPN), and/or username of aplurality of end-users is provided. A plurality of groups associatedwith the plurality of end-users is provided. The mid-link server isconfigured to interact with a program module and a user interface. Theprogram module integrates with an external application and the userinterface allows integration with the mid-link server. The userinterface leverages the program module. A snippet is created for theconfiguration of the user directory from the user interface for each ofthe plurality of end-users. A set of user policies associated with theplurality of end-users and a set of group policies associated with theplurality of groups are determined by the mid-link server. A high-riskuser from the plurality of end-users is determined using the externalapplication and the high-risk user is added to a group of high-riskusers assigned with a lower set of privileges for the configuration.Specific policies are applied for the high-risk user. A higher set ofprivileges for the configuration to the plurality of end-users excludingthe high-risk user is assigned by the mid-link server. A threat isdetermined associated with an end-user of the plurality of end-usersbased on a type of the threat, a threat level is determined based on thetype of the threat, and the threat level is compared to a thresholdlevel, the threshold level categorizes the end-user as the high-riskuser. The user directory is deployed by the mid-link server using thesnippet based on the set of user policies and the set of group policies.The configuration of the user directory is based on the set of userpolicies and the set of group policies.

In another embodiment, a method for automatically configuring userdirectory based on user and group policies in a multi-tenant system. Inone step, a plurality of user attributes for configuration of a userdirectory is acquired. The plurality of user attributes includes emailaddress, User Principal Name (UPN), and/or username of a plurality ofend-users. A plurality of groups associated with the plurality ofend-users is acquired. Interaction is made with a mid-link server usinga program module and a user interface. The program module integrateswith an external application and the user interface allows integrationwith the mid-link server. The user interface leverages the programmodule. A snippet is created for the configuration of the user directoryusing the user interface for each of the plurality of end-users. A setof user policies associated with the plurality of end-users and a set ofgroup policies associated with the plurality of groups is determined bythe mid-link server. A high-risk user is determined by the mid-linkserver using the external application from the plurality of end-users.The high-risk user is added to a group of high-risk users assigned witha lower set of privileges for the configuration. Specific policies areapplied for the high-risk user. A higher set of privileges for theconfiguration to the plurality of end-users excluding the high-risk useris assigned by the mid-link server. A threat is determined associatedwith an end-user of the plurality of end-users based on a type of thethreat, a threat level is determined based on the type of the threat,and the threat level is compared to a threshold level, the thresholdlevel categorizes the end-user as the high-risk user. The user directoryis deployed using the snippet based on the set of user policies and theset of group policies. The configuration of the user directory is basedon the set of user policies and the set of group policies.

In yet another embodiment, a cloud network for policy based provisioningof user directory using a program and an interface, the cloud networkcomprising a plurality of servers, collectively having code for:

-   -   acquiring a plurality of user attributes for configuration of a        user directory, wherein the plurality of user attributes        includes email address, User Principal Name (UPN), and/or        username of a plurality of end-users;    -   acquiring a plurality of groups associated with the plurality of        end-users;    -   interacting with a mid-link server using a program module and a        user interface; wherein: the program module integrates with an        external application, and the user interface allows integration        with the mid-link server, and the user interface leverages the        program module;    -   creating a snippet for the configuration of the user directory        using the user interface for each of the plurality of end-users;    -   determining by the mid-link server, a set of user policies        associated with the plurality of end-users;    -   determining by the mid-link server, a set of group policies        associated with the plurality of groups;    -   determining by the mid-link server using the external        application, a high-risk user from the plurality of end-users        and adding the high-risk user to a group of high-risk users        assigned with a lower set of privileges for the configuration,        wherein specific policies are applied for the high-risk user,        wherein a threat is determined associated with an end-user of        the plurality of end-users based on a type of the threat, a        threat level is determined based on the type of the threat, and        the threat level is compared to a threshold level, the threshold        level categorizes the end-user as the high-risk user;    -   assigning by the mid-link server, a higher set of privileges for        the configuration to the plurality of end-users excluding the        high-risk user; and    -   deploying by the mid-link server, the user directory using the        snippet based on the set of user policies and the set of group        policies, wherein the configuration of the user directory is        based on the set of user policies and the set of group policies.

BACKGROUND

This disclosure relates in general to a user directory synchronizationand, but not by way of limitation, to automatic user directorysynchronization and policy deployment, among other things.

Automating an exchange of user identity information between identitydomains, or IT systems and directory synchronization using SCIM (Systemfor Cross-domain Identity Management) is popular among customers, mainlydue to its minimal footprint on the customers' infrastructure. SCIMintegrations don't require an installation of any software on anycustomer side. SCIM are software applications created within thecustomers' IdP (Identity Provider). However, the SCIM integrations haveslow activation and directory synchronizations in productionenvironments.

Moreover, Sales Engineers (SEs) takes more time in their Proof ofConcepts (POCs), and working in this area makes it difficult for the SEsto focus on the customer regarding features that can generate a sale.Currently no software allows the customers to quickly integrate asnippet of the customer's directory without any software or hardwarerequirement in POCs or production activations, or to do a complete SCIMdirectory troubleshooting with minimal technical skills.

When using Representational State Transfer (REST) ApplicationProgramming Interface (API) calls of SCIM, all the interaction is basedon SCIM Identifiers. For example, unique identifiers, that are 128-bitnumbers, and are far more complex. Much more friendly parameters areneeded for interaction to make the directory synchronization andactivation much faster.

SUMMARY

In one embodiment, the present disclosure provides a cloud network forautomatically provisioning a user directory in a multi-tenant system.The cloud network includes a local application that executes on anend-user device and a mid-link server coupled to a plurality of end-userdevices. User attributes for configuration of the user directory andgroups associated with the plurality of end-users is received from thelocal application. A program module integrates with an externalapplication and the user interface allows integration with the mid-linkserver. A snippet is created for the configuration of the user directoryfrom the user interface for each of the plurality of end-users. Userpolicies and group policies associated with the plurality of end-usersare determined. A high-risk user from the plurality of end-users isdetermined using the external application. The user directory isdeployed using the snippet based on the user policies and the grouppolicies.

In an embodiment, a cloud network for automatically provisioning userand group profiles using directory synchronization in a multi-tenantsystem is disclosed. The cloud network includes a local applicationconfigured to execute on an end-user device and a mid-link servercoupled to a plurality of end-user devices. The local application isfurther configured to provide a plurality of user attributes forconfiguration of a user directory. The plurality of user attributesincludes email address, User Principal Name (UPN), and/or username of aplurality of end-users is provided. A plurality of groups associatedwith the plurality of end-users is provided. The mid-link server isconfigured to interact with a program module and a user interface. Theprogram module integrates with an external application and the userinterface allows integration with the mid-link server. The userinterface leverages the program module. A snippet is created for theconfiguration of the user directory from the user interface for each ofthe plurality of end-users. A set of user policies associated with theplurality of end-users and a set of group policies associated with theplurality of groups are determined by the mid-link server. A high-riskuser from the plurality of end-users is determined using the externalapplication and the high-risk user is added to a group of high-riskusers assigned with a lower set of privileges for the configuration.Specific policies are applied for the high-risk user. A higher set ofprivileges for the configuration to the plurality of end-users excludingthe high-risk user is assigned by the mid-link server. The userdirectory is deployed by the mid-link server using the snippet based onthe set of user policies and the set of group policies. Theconfiguration of the user directory is based on the set of user policiesand the set of group policies.

In another embodiment, a method for automatically configuring userdirectory based on user and group policies in a multi-tenant system. Inone step, a plurality of user attributes for configuration of a userdirectory is acquired. The plurality of user attributes includes emailaddress, User Principal Name (UPN), and/or username of a plurality ofend-users. A plurality of groups associated with the plurality ofend-users is acquired. Interaction is made with a mid-link server usinga program module and a user interface. The program module integrateswith an external application and the user interface allows integrationwith the mid-link server. The user interface leverages the programmodule. A snippet is created for the configuration of the user directoryusing the user interface for each of the plurality of end-users. A setof user policies associated with the plurality of end-users and a set ofgroup policies associated with the plurality of groups is determined bythe mid-link server. A high-risk user is determined by the mid-linkserver using the external application from the plurality of end-users.The high-risk user is added to a group of high-risk users assigned witha lower set of privileges for the configuration. Specific policies areapplied for the high-risk user. A higher set of privileges for theconfiguration to the plurality of end-users excluding the high-risk useris assigned by the mid-link server. The user directory is deployed usingthe snippet based on the set of user policies and the set of grouppolicies. The configuration of the user directory is based on the set ofuser policies and the set of group policies.

In yet another embodiment, a cloud network for policy based provisioningof user directory using a program and an interface, the cloud networkcomprising a plurality of servers, collectively having code for:

-   -   acquiring a plurality of user attributes for configuration of a        user directory, wherein the plurality of user attributes        includes email address, User Principal Name (UPN), and/or        username of a plurality of end-users;    -   acquiring a plurality of groups associated with the plurality of        end-users;    -   interacting with a mid-link server using a program module and a        user interface; wherein: the program module integrates with an        external application, and the user interface allows integration        with the mid-link server, and the user interface leverages the        program module;    -   creating a snippet for the configuration of the user directory        using the user interface for each of the plurality of end-users;    -   determining by the mid-link server, a set of user policies        associated with the plurality of end-users;    -   determining by the mid-link server, a set of group policies        associated with the plurality of groups;    -   determining by the mid-link server using the external        application, a high-risk user from the plurality of end-users        and adding the high-risk user to a group of high-risk users        assigned with a lower set of privileges for the configuration,        wherein specific policies are applied for the high-risk user;    -   assigning by the mid-link server, a higher set of privileges for        the configuration to the plurality of end-users excluding the        high-risk user; and    -   deploying by the mid-link server, the user directory using the        snippet based on the set of user policies and the set of group        policies, wherein the configuration of the user directory is        based on the set of user policies and the set of group policies.

Further areas of applicability of the present disclosure will becomeapparent from the detailed description provided hereinafter. It shouldbe understood that the detailed description and specific examples, whileindicating various embodiments, are intended for purposes ofillustration only and are not intended to necessarily limit the scope ofthe disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is described in conjunction with the appendedfigures:

FIG. 1 illustrates a block diagram of an embodiment of a cloud network;

FIG. 2 illustrates a block diagram of an embodiment of a single-tenantcloud network where an end-user device communicates with a cloudprovider;

FIG. 3 illustrates a block diagram of an embodiment of an end-userdevice that includes a client for enabling enhanced routing control;

FIG. 4 illustrates a block diagram of an embodiment of a client;

FIG. 5 illustrates an overview of a block diagram of an embodiment of amid-link server;

FIG. 6 illustrates a Graphical User Interface (GUI) of a groupconfiguration of the end-user;

FIG. 7 illustrates a Graphical User Interface (GUI) of a userconfiguration of the end-user;

FIG. 8 illustrates a Graphical User Interface (GUI) for policyassignment of the end-user;

FIG. 9 illustrates a flowchart of an embodiment of a provisioningprocess for user and group profiles using directory synchronization in amulti-tenant system;

FIG. 10 illustrates a flowchart of an embodiment of a threat detectionprocess 1000 which identifies high-risk users; and

FIG. 11 illustrates a flowchart of an embodiment of a troubleshootingprocess.

In the appended figures, similar components and/or features may have thesame reference label. Further, various components of the same type maybe distinguished by following the reference label by a dash and a secondlabel that distinguishes among the similar components. If only the firstreference label is used in the specification, the description isapplicable to any one of the similar components having the same firstreference label irrespective of the second reference label.

DETAILED DESCRIPTION

The ensuing description provides preferred exemplary embodiment(s) only,and is not intended to limit the scope, applicability or configurationof the disclosure. Rather, the ensuing description of the preferredexemplary embodiment(s) will provide those skilled in the art with anenabling description for implementing a preferred exemplary embodiment.It is understood that various changes may be made in the function andarrangement of elements without departing from the spirit and scope asset forth in the appended claims.

Referring first to FIG. 1 , a block diagram of an embodiment of a cloudnetwork 100 allowing multiple-tenants in different domains tocommunicate with various cloud providers over the public internet isshown. The cloud network 100 allows multiple tenants/multi-tenantsystems or enterprises to use the same network separated by domain orsome other logical separation. Encryption, leased/encrypted tunnels,firewalls, and/or gateways can be used to keep the data from oneenterprise 198 separate from other enterprise(s) 198. Each end-userdevice 195 can communicate with cloud provider(s) 140 of services andstorage using the Public Internet 125. A mid-link server 185 providesmulti-tenancy control, policies and routing for each domain. The cloudnetwork 100 can include a plurality of servers.

The cloud network 100 can include a first computing environment 150-1having end-user devices 195-1 for a first domain, a second computingenvironment 150-2 having end-user devices 195-2 for a second domain, anda third computing environment 150-3 having end-user devices 195-3 for athird domain. Each domain communicates with its respective enterprise198 using a virtual private network (VPN) 190 over local area networks(LANs), wide area networks (WANs), and/or the public Internet 125.Instead of a VPN 190 as an end-to-end path, tunneling (e.g., InternetProtocol in Internet Protocol (IP-in-IP), Generic Routing Encapsulation(GRE)), policy-based routing (PBR), Border Gateway Protocol(BGP)/Interior Gateway Protocol (IGP) route injection, or proxies couldbe used. The first cloud provider 140-1, the second cloud provider140-2, and the third cloud provider 140-3 may be public or privateclouds. Some examples of the cloud providers 140 include Amazon WebServices (AWS)®, Google Cloud Platform (GCP)®, and Microsoft Azure®.Some or all of the cloud providers 140 may be different from each other,for example, the first cloud provider 140-1 may run Amazon Web Services(AWS)®, the second cloud provider 140-2 may run Google Cloud Platform(GCP)®, and the third cloud provider 140-3 may run Microsoft Azure®.Although three cloud providers 140 are shown, any suitable number ofcloud providers 140 may be provided with some captive to a particularenterprise or otherwise not accessible to multiple domains.

Each of the cloud providers 140 may communicate with the Public Internet125 using a secure connection. For example, the first cloud provider140-1 can communicate with the Public Internet 125 via a virtual privatenetwork (VPN) 190, the second cloud provider 140-2 can communicate withthe Public Internet 125 via a different VPN 190, and the third cloudprovider 140-3 can communicate with the Public Internet 125 via yetanother VPN 190. Some embodiments could use leased connections orphysically separated connections to segregate traffic. Although one VPN190 is shown, it is to be understood that there are many VPNs to supportdifferent end-user devices, tenants, domains, etc.

A plurality of enterprises 198 can also communicate with the PublicInternet 125 and the end-user devices 195 for their domain via VPNs 190.Some examples of the enterprises 198 may include corporations,educational facilities, governmental entities, and private consumers.Each enterprise may support one or more domains to logically separatetheir networks. The end-user devices 195 for each domain may includeindividual computers, tablets, servers, handhelds, and networkinfrastructure that are authorized to use computing resources of theirrespective enterprise 198.

Further, the mid-link server 185 can communicate with the PublicInternet 125 via a VPN 190. The mid-link server 185 also provides cloudaccess security broker (CASB) functionality for cloud security to theenterprises 198 with data flows of the CASB being regulated with aglobal cloud traffic controller (GCTC). Communication between themid-link server 185 and the cloud providers 140 for a given enterprise198 can be either a VPN connection or tunnel depending on preference ofthe enterprise 198. The mid-link server 185 can configure, test, andenforce user and/or group policies and routing across the cloud network100. For example, the mid-link server 185 can ensure that the policiesare consistent across the cloud providers 140, enterprises 198 andcomputing environments 150. The mid-link server 185 provides proxies tocloud providers and can apply various policies. The connection betweenend-user devices 195 and the mid-link server 185 is over an encryptedVPN or tunnel. The cloud network 100 provides for policy basedprovisioning of user directory using a program and an interface.

With reference to FIG. 2 , a block diagram of an embodiment of asingle-tenant cloud network 200 where an end-user device 195communicates with a cloud provider 140 is shown. The end-user device 195is operated by an end-user 204. The cloud provider 140 is accessibledirectly or through the mid-link server 185 depending on the routechose, services, policies, etc. Included in the cloud provider 140 areservices 216 such as storage 212 that enable applications andfunctionality on the end-user devices 195.

Service endpoints 214 are provided in the cloud provider 140 to enablecommunication with the mid-link server 185 and end-user devices 195.Service endpoints 214 may include VPN terminations and proxies thatprovide for a secure tunnel with the mid-link server 185 and/or theend-user devices 195. The mid-link server 185 can optionally connectdirectly with services 216 and storage 212 of the cloud provider 140without using the service endpoints 214. In some cases, the end-userdevice 195 communicates with the services 216 and the storage 212through the mid-link server 185 depending on route preference andpolicies.

Referring next to FIG. 3 , a block diagram of an embodiment of anend-user device 195 that includes a client 304 for enabling enhancedrouting control is shown. The end-user device 195 includes one or morelocal application or applications (apps) 302 and a browser 308 that usethe client 304 for communication over the LAN 306 and ultimately to thecloud providers 140 (not shown). The browser 308 and the apps 302 can beredirected using domain name services (DNS) to use the client 304.Alternatively, the browser 308 and the apps 302 may natively support theclient 304 to utilize Application Programming Interfaces (APIs) or othercommunication to select policies and receive the corresponding usergroups and/or user profiles.

Referring next to FIG. 4 , a block diagram of an embodiment of a client304 is shown that can specify by the policies, and provide userdirectory information for example, email address, User Principal Name(UPN), and/or username which specifies grant to cloud services under themanagement of a client controller 404. The client controller 404configures a DNS, fulfills API request, populates routes, specifies userand/or group policies, acquires the user directory information from auser interface 416, and a policy cache 412 for selection of the userand/or group policies. In operation, the client controller 404configures data and service requests over the cloud network 100.

The user interface 416 is a python Command Line Interface (CLI) toolusing a SCIMClient class of a program module 410 that allowsadministrators to create POC SCIM integrations or manage the existingSCIM integrations easily. The CLI tool is an executable tool availablein Mac® Operating System and Windows® endpoints that can run in the mostpopular terminal applications available. The user interface 416leverages the program module 410. The SCIM Client is a protocol clientas a website or an application that uses the SCIM protocol to manageidentity data maintained by the SCIM service provider (mid-link server185). The SCIM Client initiates SCIM (REST Hypertext Transfer Protocol(HTTP)) requests to a target SCIM service provider.

The client 304 can be specified for use with a DNS 408 who redirectstraffic from browsers 308 and the apps 302 to go through the client 304.Without changing any apps 302 or the browser 308, the client 304 canprocess traffic for the cloud network 100. The client 304 can operate asa proxy using a service proxy 402 or a VPN using the client endpoint406. An API 414 is provided for the apps 302 to configure the client 304if they have that capability. The mid-link server 185 can also configurethe client 304.

The mid-link server 185 sends relevant policies to the policy cache 412to provide functionality to the client 304. The policies allowspecifying the user and/or group configuration and the user directorysynchronization for the client 304 to use. The user directorysynchronization provides group-based reporting, group-basedsteering/access to specific Software as a Service (SaaS) applications,websites, private applications, group-based real-time or API-enabledpolicies, group-based client configurations and group-based role-basedaccess control (RBAC) controls, other features like user-based policiesscale easily up with the deployment of directory synchronizationservices.

Table 1 gives examples of policies along with the users and the groupsas deployed by the mid-link server 185.

TABLE 1 User- User Principal Name name Email (UPN) Group Policies User01user01@abc.com user01@domain.com Group 01 Policy 1 User02 user02@abc.comuser02@domain.com Group 02 Policy 2 User03 user03@abc.comuser03@domain.com Group 03, Policy 3 Group 01 User04 user04@abc.comuser04@domain.com Group 04 Policy 4

For example, policy 1 specifies username, email, UPN, and group ofUser01. The policy 1 specifies access to specific websites and blockssocial media. Policy 2 specifies policies for User02 like access toemails outside the enterprise, Multi-factor Authentication (MFA) and VPNconnection. User03 is a member of group 03 and group 01 and policies ofboth the groups are applicable to the user03 and are included in policy3. For example, social media access via the policy of group 03 and VPNaccess and blocked access to restricted countries by the policy of group01. Policy 4 dictates the policies such as group email access, email torecipients outside the recipient and remote access to enterprise server.

The program module 410 includes a software logic that helps inintegration with external or third party solutions for the domain andthe enterprise 198 by the mid-link server 185. The program module 410includes a python module with a SCIMClient class, which facilitatesintegrations with the third party solutions. The third party solutionsare other than the currently supported ones such as Microsoft Azure®Active Directory (AD) or OKTA® as partner IdPs.

An Information Technology (IT) module 418 provides the administrators ofthe enterprise 198 to enable and/or disable the user policies and/orgroup policies. Access to particular websites, the cloud services 140,and/or access to features within a software of the enterprise 198.Alerts related to threat are indicated to the end-user 204 via the userinterface 416 by the administrators using the IT module 418.

Where non-compliance with the policy is determined from the mid-linkserver 185, the administrator generates the suggestions to remediate theproblem and displays it to the end-user 204 for review. The end-user 204can initiate remediation that is performed by the mid-link server 185.

Referring next to FIG. 5 , an overview of a block diagram of anembodiment of a mid-link server 185 is shown. The mid-link server 185includes a policy enforcer 502, a directory synchronizer 504, a dataextractor 506, a snippet generator 508, a configuration enforcer 510, apolicy store 512, a troubleshoot engine 514, a threat identifier 516, athreat cache 518, and a customer directory 520. A security analyst and anetwork operator have access to analysis performed at the mid-linkserver 185 via the IT module 418. Systems of the security analyst andthe network operator are interconnected to the mid-link server 185 viathe Public Internet 125. In another embodiment, the security analyst andthe network operator can be interconnected through a Local Area Network(LAN) of an enterprise. The security analyst and the network operatorscan perform remedial actions on the threat detected by the threatidentifier 516 based on the policies associated with the end-user device195.

The dashed line used in the figure for representing the end-user device195, and the IT module 418 indicate that the components are not a partof the mid-link server 185 and is used in the figure for illustratinginputs/outputs to/from the end-user device 195 and the IT module 418.Similar representations used in other block diagrams signify the sameillustration.

The data extractor 506 pulls the end-user's 204 directory informationincluding a number of user attributes for configuration of a userdirectory. The user attributes include email address, User PrincipalName (UPN), first name, last name, and/or username of the end-user 204.The user attributes are stored in the customer directory 520. One ormore end-user(s) 204 of the end-user device(s) 195 can also provide thedirectory information for configuration. The user attributes can also beprovided by the administrator of the enterprise(s) 198 of the end-users204 or a Human Resource system of the enterprise(s) 198. The end-users204 can either provide their respective user attributes viaconfiguration files and text files such as comma-separated values (CSV)files or manually provide to the tool as parameters. The customerdirectory 520 is a repository of the customers that is the end-user's204 directory information which can be retrieved later by othercomponents of the mid-link server 185 for further analysis.

The configuration files are represented as scimclient.conf, a SCIMclient configuration file hosted in the same folder as the SCIM clientmodule file that defines the connected tenant relevant FQDN (FullyQualified Domain Name), Organization ID and OAuth SCIM Token parameters.

The CSV files are a set of CSV files hosted in subfolder csv filesrelative to the SCIM client module file and are used to define the userattributes or SCIM parameters required by some commands (SCIM users andgroups details) or users manually created in the user interface 416.

The directory synchronization 504 updates the end-user's 204 directoryinformation based on a comparison of the information from the customerdirectory 520 with the end-user's 204 directory information acquiredfrom the data extractor 506. For example, for the end-user 204 providingthe user attributes for the first time, the customer directory 520cannot be updated with the user attributes. In such cases, the directorysynchronizer 504 updates the customer directory 520 to reflect the mostrecent user attributes of the end-users 204.

The policy enforcer 502 retrieves the policies from the policy store512. The policy store 512 includes the policies specific to therequirements of the end-users 204 and the groups of the end-users 204.The policies are determined by the policy enforcer 502 based on the roleof the end-user 204, the tenant or enterprise 198 of the end-user 204,the group or the team associated with the end-user 204 and/or other userand entity behavior analytics (UEBA), source/destination, geographicallocation of the end-users 204, or user connection. The policies are alsobased on the groups of the end-user 204. The policy enforcer 502 furtherreceives threat information from the threat identifier 516 and filtersthe policies (if required) based on the threat information.

The threat identifier 516 identifies the threat information related to amalicious, an anonymous, or an unidentified user activity that cancreate vulnerability and threat to data security within the enterprise198. The end-user 204 associated with the threat is identified as ahigh-risk user or a risky user. The threat identifier 516 is coupledwith the program module 410 which extracts real-time threat informationbased on user activities from an external application or a third partysolution. For example, a SOAR (Security Orchestration, Automation andResponse) platform detects that an end-user 204 is the high-risk user.

The threat identifier 516 classifies the threat based on a level ofthreat associated with the threat in the threat cache 518. The level ofthreat is proportional to the vulnerability caused by the threat to theend-user device 195, to the enterprise 198 network and/or the datasecurity within the enterprise 198. Remediations associated with thethreat is also stored along with the previously identified threats. Ifthe threat identifier 516 is unable to track the threat in the threatcache 518, possibly because it is being detected for the first time oris the unidentified threat, the threat is entered in the threat cache518. For example, remediations can include using the SCIMClient class orthe CLI tool to add the risky end-user 204 to a specific existing SCIMgroup with less privileges in the configuration and remove it from thatgroup when the threat that the high-risk user represents is remediated.

The policy enforcer 502 filters the policies based on the threatinformation. Further, the policy enforcer 502 resolves any conflict oranonymity between the user and the group specific policies. For example,a user policy may require access to the VPN during a specific timeinterval (for example, 9 am to 6 pm) after which the access is denied.However, a group policy may require access to the VPN after 6 pm. Thisconflict between the policies is resolved and based on a priority of thework to be done by the end-user 204 and/or the specific user or grouprequirement, the policies are adjusted, and the access is allowed after6 pm. However, the access is granted till the group requirement isaccomplished after which the usual policies are applied. In anembodiment, the policy enforcer 502 may block certain websites as partof the remediation or an updated policy. If there are no conflicts, thenresolution is not required.

The policy enforcer 502 can also add the high-risk user 204 to ahigh-risk group with a lower set of privileges in configuration for theend-user 204. However, the other end-users 204 not identified as thehigh-risk end-users 204 are assigned a higher set of privileges. Thefiltered user and/or the group policies along with the identification ofthe end-user 204 as the high-risk user is provided to the snippetgenerator 508.

The snippet generator 508 creates a snippet of the end-user's 204directory without any software or hardware requirement in POCs orproduction activations based on the user and/or the group policies. Thesnippet is integrated with the user interface 416 and is created usingthe CLI tool. The snippet is created to implement the end-user's 204directory.

The configuration enforcer 510 deploys the end-user's 204 directory viathe app 302 on the end-user device 195. The end-user's directory isconfigured and displayed on the end-user device 195 for the end-user204. The configuration enforcer 510 further provides details of thedeployed end-user's 204 directory to the IT module 418 and thetroubleshoot engine 514 for further inspection and/or analysis.Different configurations are deployed based on the user and/or the grouppolicies.

The troubleshoot engine 514 checks or troubleshoots the directorysynchronizations in production environments. The troubleshoot engine 514is coupled with the SCIM client CLI tool of the user interface 416 thatcan help troubleshoot production SCIM integrations and also troubleshootdirectly in the customer's environment. For example, if the end-userdevice 195 doesn't get enabled due to incorrect userName attribute, thetroubleshoot engine 514 uses the CLI tool to compare the userNameattribute with the command prompt output seen on the affected devices.The problem arising due to the incorrect userName attribute isidentified and remediated accordingly.

By way of an example, incorrect steering configuration or clientconfiguration, and real-time protection policies that are not applied onthe end-user devices 195 are identified. The CLI tool can help create atest SCIM user added to the same SCIM groups as the affected users. Thiscan help the support engineers or the administrators to reproduce thecustomer issue in their tenant quickly and take the appropriate nextsteps. In another example, the issues with the backend server or themid-link server 185 are detected. The CLI tool can help to quicklycompare the number of SCIM users and groups retrieved from therepresentational state transfer (REST) API, against the number of usersand groups seen in the tenant User Interface that is the user interface416. If the numbers match, a pointer indicates by pointing to internaldatabases inconsistencies in the mid-link server 185.

Other problems associated with policies enforcement, and directorysynchronization are identified and remediated by the troubleshoot engine514. The troubleshoot engine 514 provides results of the troubleshootingperformed to the IT module 418 for further analysis or control.

Referring next to FIG. 6 , a Graphical User Interface (GUI) 600 of agroup configuration of the end-user 204 is shown according to someembodiment of the present disclosure. The GUI 600 includes a tenant userinterface 602 that is displayed to the end-user 204 via the userinterface 416. Subsection 604 indicates a weblink used to access thetenant UI 602. Button 606 displays groups for the end-user 204. Onclicking the button 606, number of groups for the end-user 204 aredisplayed in a subsection 608. For example, four groups namely, group01, group 02, group 03, and group 04 are found for the end-user 204which are displayed in a subsection 612 of a section 610. Details ofthese groups can be viewed by selecting from a view details tab 614. Forexample, by clicking on the group 01, the details of the group 01 aredisplayed in a section 616. Invitations for joining a group can be sendto the end-user 204 (not present in the group 01) and/or other end-users204 who need to be added to the group using a send invitation tab 618.The section 616 displays group details 620 including name of the group622 which is group 01 in this case. Members of the group 01 aredisplayed via a member users subsection 624. The members can be searchedusing a search field 626. The members email and name are displayed asthe details in a subsection 628.

Referring next to FIG. 7 , a Graphical User Interface (GUI) 700 of auser configuration of the end-user 204 is shown. The GUI 700 includes atenant user interface 702 that is displayed to the end-user 204 via theuser interface 416. Subsection 704 indicates a weblink used to accessthe tenant UI 702. Button 706 displays users that are already configuredusing the tenant UI 702. On clicking the button 606, number of users forthe end-user 204 are displayed in a subsection 708. For example, fiveusers namely, user 01, user 02, user 03, user 04, and user 05 are foundwhich are displayed in a subsection 710. The user's email and name aredisplayed in the subsection 710. Groups associated with these users canbe viewed by selecting from a view users tab 712. Invitations related toconfigurations of the end-user 204 and/or other end-users 204 can besend to the respective users using a send invitation tab 714.

Referring next to FIG. 8 , a Graphical User Interface (GUI) 800 forpolicy assignment of the end-user 204 is shown. The GUI 800 includes auser interface 802 that is displayed to the end-user 204 via the userinterface 416 and the administrators for assigning policies to theend-user 204. Subsection 804 indicates a weblink used to access the userinterface 802. Policy name for the policies to be assigned to theend-user 204 is displayed using a policy tab 806. Any new policy can beadded using a new policy tab 808. The policies may be filtered by addinga filter using an add filter button 810. The policies are displayed in apolicy subsection 812. Name, source, destination, profile, action andalerts of the policies are displayed in a subsection 814. For example, apolicy that allows social media access from any source and destinationwith no restriction on user profile like employee or vice president. Noalerts related to the malicious use of the social media by the end-user204 has been reported so far which is indicated in the subsection 814 aszero.

Referring next to FIG. 9 , a flowchart of an embodiment of aprovisioning process 900 for user and group profiles using directorysynchronization in a multi-tenant system is shown. The depicted portionof the process begins at block 902 where an end-user 204 of the end-userdevice 195 loads browser or a remote application at the end-user device195. The end-user 204 provides user attributes for configuration of anend-user profile and a group profile for the end-user 204. The userattributes are username, email, first and last name of the end-user 204.The user attributes are provided via the user interface 416 which is aCLI tool and works with the program module 410 for creating the userdirectory of the end-user 204. In another embodiment, an administratorof the enterprise 198 of the end-user 204 can also provide the userattributes.

An abstraction layer allows the administrators of the enterprise 198 tointeract with the mid-link server 185 using the user attributesdisplayed in the user interface 416 such as email address and displayname for groups. When using REST API calls alone, the interaction isbased on SCIM IDs which are 128-bit numbers and are far more complex.When a user or group is created by the mid-link server 185, it returnsto the user interface 416, a SCIM ID for the object created which isthen referenced afterwards by the end-user 204 to perform tasks over it.The program module 410 includes a logic to provide the abstraction layerand have the administrators focusing on much more friendly parameters.

Having a tool built-in with all the parameters to perform the requiredHypertext Transfer Protocol (HTTP), API calls requiring few parametersto be entered is far easier than building custom HTTP API calls withstate-of-the-art software products (Postman, curl, wget, etc.)

Some commands supported by the SCIM Client project like “delete all SCIMusers” or “delete all SCIM groups” are simply not possible without somelogic on top of performing custom HTTP API calls.

At block 904, groups associated with the end-user 204 can either bedetermined by the mid-link server 185 or by an administrator of theenterprise 198 of the end-user 204 or can be manually set by theend-user 204 through the user interface 416. The groups can be based ona role of the end-user 204 in the enterprise 198 such as grade two levelemployee, manager, vice-president or receptionist. The group can bebased on a work profile of the user such as analyst, administrator,developer or technician. The group can be further based on a rank of theend-user 204 such as vice-president, director or manager can haveseparate group. The end-user 204 can be a member of more than one group.

At block 906, user policies associated with the end-user 204 aredetermined by the mid-link server 185. The user policies are based on auser role, a user designation, a work profile, source and destination ofthe end-user 204, VPN, UEBA information of the end-user 204, user'sgeographical location, a user residency, and/or a user connection.

At block 908, group policies associated the group(s) of the end-user 204are determined by the mid-link server 185. The group policies are basedon the user role of each of the members of the groups, a team of themembers, the user designation of the members, geographical location ofmembers of the groups, the work profile of the members of the groups,UEBA information of the members, and/or the user connection of each ofthe members.

At block 910, conflicts related to the user policies and the grouppolicies are resolved by the mid-link server 185. For example, the userpolicies can specify blocked social media accounts for the end-user 204.However, the group policies can specify access to one of the socialmedia accounts for some demonstration work. The conflict between theuser and the group policies are resolved providing access to a socialmedia account based on the requirement. However, if there are noconflicts, then resolution is not required.

At block 912, high-risk users are determined based on threat informationacquired from an external application or third party solution such asSOAR. The mid-link server 185 acquires the threat information andanalyses the end-user 204 to determine whether the end-user 204 is ahigh-risk user or not.

At block 914, privileges are assigned to the end-user 204 based onwhether the end-user 204 is the high-risk user or not. If the end-user204 is the high-risk user, the end-user 204 is assigned a lower set ofprivileges in the configuration. For example, the end-user 204 can beblocked from using specific web sites or the VPN connection. Therestrictions in access to the enterprise 198 server or the otherservices and/or websites are based on policies that are set against thehigh-risk users in the policy store 512. However, if the end-user 204 isnot the high-risk user, the end-user 204 is assigned a higher set ofprivileges in the configuration. For example, the end-user 204 can beallowed access to the services and websites based on the user and thegroup policies as usual.

At block 916, a snippet of the configuration of the user directory forthe end-user 204 is created. The user interface 416 allows the creationof the snippet which can be successfully integrate the user directoryfor the end-user 204.

At block 918, the user directory is deployed by the mid-link server 185using the snippet based on the user and group policies. The userdirectory is quickly deployed without any software or hardwarerequirement in POCs or production activations which makes it easy forthe sales engineer to generate sales and focus on customers. Differentconfigurations are deployed based on the user and/or the group policies.

Referring next to FIG. 10 , a flowchart of an embodiment of a threatdetection process 1000 which identifies high-risk users is shown. Thedepicted portion of the process 1000 begins at block 1002 where userattributes are acquired from either the enterprise 198 or the end-user204 for configuration of a user directory.

At block 1004, a determination of whether the end-user 204 is ahigh-risk user is made. A threat information including UEBA informationis received from a third party application like SOAR or an externalsecurity application. Based on the threat information and UEBAinformation acquired by the mid-link server 185, it is determinedwhether the end-user 204 is the high-risk user or not. If the end-user204 is the high-risk user, then at block 1006, a threat associated withthe end-user 204 is determined based on a type of the threat. Forexample, a malicious activity or a pirated software installed by theend-user 204 at the end-user device 195 can cause a vulnerability to theend-user device 195 and the enterprise 198 network as well. A threatlevel associated with the type of threat is determined. The threat levelcan be compared with a threshold level like a random number assigned tothe threat level based on severeness of the vulnerability that itcauses. The threshold level is used to categorize the end-user 204 asthe high-risk user. The end-user 204 is grouped at block 1006.

At block 1008, if the end-user 204 is the high-risk user, then theend-user 204 is grouped in a high-risk group with a lower set ofprivileges for configuration of the user directory. For example, theend-user 204 can be restricted use to the enterprise 198 for a specificduration until the threat is remediated. If the end-user 204 is not thehigh-risk user, then the end-user 204 is categorized in a group with ahigher set of privileges for configuration. For example, the end-user204 can have access to the enterprise VPN while the high-risk usercannot.

At block 1010, the threat associated with the high-risk user isremediated. Policies or rules associated with remediation of the threatcan be identified from the policy store 512. For example, updating theanti-virus software at the end-user device 195 or upgrading systemsoftware.

At block 1012, after the threat is remediated, the end-user 204 isremoved from the high-risk group and is moved to the group with thehigher set of privileges for the configuration of the user directory atblock 1008.

At block 1014, user policies and group policies are determined for theend-user 204. The user policies are based on a user role, a userdesignation, a user profile, source and destination of the end-user 204,VPN, UEBA information of the end-user 204, user's geographical location,a user residency, and/or a user connection. The group policies are basedon the user role of the members of the groups, a team of the members,the user designation of the members, geographical locations of membersof the groups, the work profile of the members of the groups, UEBAinformation of the members, and/or the user connection of the members.

At block 1016, any conflicts between applications of the user policiesand the group policies are resolved. If the resolution cannot be doneautomatically, an administrator of the enterprise 198 of the end-user204 or the end-user 204 can deal with the resolution of the conflict.

At block 1018, the user policies and the group policies are updatedbased on the resolution of the conflict. An updated policy is applicablefor the end-user 204. The updated policy can be applicable till theapplication of the both the user policies and the group policiestogether. The enterprises 198 update the user policies and/or the grouppolicies based on the resolution of the conflict. The policies withinthe enterprise 198 are also updated from time to time and thus the userpolicies and the group policies can also be updated accordingly.

Referring next to FIG. 11 , a flowchart of an embodiment of atroubleshooting process 1100 is shown. The depicted portion of process1100 begins at block 1102 where the end-user 204 provides userattributes via the user interface 416 and/or an administrator of theenterprise 198 provides the user attributes for configuration of a userdirectory for the end-user 204. The user attributes include username,email and/or UPN. The user interface 416 can be a python CLI tool. Theuser directory is configured by interacting of the end-user device 195or an enterprise 198 agent with the mid-link server 185.

At block 1104, integration of a snippet of the user directory isperformed using the program module 410 which can be a python module. Thesnippet is created by using the user interface 416 and providing theuser attributes. The user directory is deployed by the mid-link server185.

At block 1106, administrators of the enterprise 198 are allowed tocreate POC SCIM integrations using the python CLI tool or manage theexisting SCIM integrations.

At block 1108, the mid-link server 185 determines whether thetroubleshooting of the user directory synchronizations in productionenvironments is required for the end-user 204. If the troubleshooting isrequired then at block 1110, troubleshooting is performed. Thetroubleshooting requires minimum technical skills. The python CLI toolcan help to quickly address troubleshooting scenarios that customerexperience and support teams often face. The troubleshooting isperformed using CLI tool GET operations from the user interface 416. Ifthe troubleshooting is not required then at block 1112, SCIMintegrations are checked for a troubleshooting scenario and the process1100 moves to block 1104.

Specific details are given in the above description to provide athorough understanding of the embodiments. However, it is understoodthat the embodiments may be practiced without these specific details.For example, circuits may be shown in block diagrams in order not toobscure the embodiments in unnecessary detail. In other instances,well-known circuits, processes, algorithms, structures, and techniquesmay be shown without unnecessary detail in order to avoid obscuring theembodiments.

Implementation of the techniques, blocks, steps and means describedabove may be done in various ways. For example, these techniques,blocks, steps and means may be implemented in hardware, software, or acombination thereof. For a hardware implementation, the processing unitsmay be implemented within one or more application specific integratedcircuits (ASICs), digital signal processors (DSPs), digital signalprocessing devices (DSPDs), programmable logic devices (PLDs), fieldprogrammable gate arrays (FPGAs), processors, controllers,micro-controllers, microprocessors, other electronic units designed toperform the functions described above, and/or a combination thereof.

Also, it is noted that the embodiments may be described as a processwhich is depicted as a flowchart, a flow diagram, a swim diagram, a dataflow diagram, a structure diagram, or a block diagram. Although adepiction may describe the operations as a sequential process, many ofthe operations can be performed in parallel or concurrently. Inaddition, the order of the operations may be re-arranged. A process isterminated when its operations are completed, but could have additionalsteps not included in the figure. A process may correspond to a method,a function, a procedure, a subroutine, a subprogram, etc. When a processcorresponds to a function, its termination corresponds to a return ofthe function to the calling function or the main function.

Furthermore, embodiments may be implemented by hardware, software,scripting languages, firmware, middleware, microcode, hardwaredescription languages, and/or any combination thereof. When implementedin software, firmware, middleware, scripting language, and/or microcode,the program code or code segments to perform the necessary tasks may bestored in a machine readable medium such as a storage medium. A codesegment or machine-executable instruction may represent a procedure, afunction, a subprogram, a program, a routine, a subroutine, a module, asoftware package, a script, a class, or any combination of instructions,data structures, and/or program statements. A code segment may becoupled to another code segment or a hardware circuit by passing and/orreceiving information, data, arguments, parameters, and/or memorycontents. Information, arguments, parameters, data, etc. may be passed,forwarded, or transmitted via any suitable means including memorysharing, message passing, token passing, network transmission, etc.

For a firmware and/or software implementation, the methodologies may beimplemented with modules (e.g., procedures, functions, and so on) thatperform the functions described herein. Any machine-readable mediumtangibly embodying instructions may be used in implementing themethodologies described herein. For example, software codes may bestored in a memory. Memory may be implemented within the processor orexternal to the processor. As used herein the term “memory” refers toany type of long term, short term, volatile, nonvolatile, or otherstorage medium and is not to be limited to any particular type of memoryor number of memories, or type of media upon which memory is stored.

Moreover, as disclosed herein, the term “storage medium” may representone or more memories for storing data, including read only memory (ROM),random access memory (RAM), magnetic RAM, core memory, magnetic diskstorage mediums, optical storage mediums, flash memory devices and/orother machine readable mediums for storing information. The term“machine-readable medium” includes, but is not limited to portable orfixed storage devices, optical storage devices, and/or various otherstorage mediums capable of storing that contain or carry instruction(s)and/or data.

While the principles of the disclosure have been described above inconnection with specific apparatuses and methods, it is to be clearlyunderstood that this description is made only by way of example and notas limitation on the scope of the disclosure.

What is claimed is:
 1. A cloud network for automatically provisioninguser and group profiles using directory synchronization in amulti-tenant system, the cloud network comprising: a local applicationconfigured to execute on an end-user device, the local application isfurther configured to: provide a plurality of user attributes forconfiguration of a user directory, wherein the plurality of userattributes includes email address, User Principal Name (UPN), and/orusername of a plurality of end-users; provide a plurality of groupsassociated with the plurality of end-users; a mid-link server coupled toa plurality of end-user devices, wherein: the mid-link server isconfigured to interact with a program module and a user interface, theprogram module integrates with an external application, and the userinterface allows integration with the mid-link server, the userinterface leverages the program module, and a snippet is created for theconfiguration of the user directory from the user interface for each ofthe plurality of end-users; determine by the mid-link server, a set ofuser policies associated with the plurality of end-users; determine bythe mid-link server, a set of group policies associated with theplurality of groups; determine by the mid-link server, using theexternal application, a high-risk user from the plurality of end-usersand adding the high-risk user to a group of high-risk users assignedwith a lower set of privileges for the configuration, wherein specificpolicies are applied for the high-risk user, wherein a threat isdetermined associated with an end-user of the plurality of end-usersbased on a type of the threat, a threat level is determined based on thetype of the threat, and the threat level is compared to a thresholdlevel, the threshold level categorizes the end-user as the high-riskuser; assign by the mid-link server, a higher set of privileges for theconfiguration to the plurality of end-users excluding the high-riskuser; and deploy the user directory using the snippet based on the setof user policies and the set of group policies, wherein theconfiguration of the user directory is based on the set of user policiesand the set of group policies.
 2. The cloud network for automaticallyprovisioning user and group profiles using directory synchronization ina multi-tenant system as recited in claim 1, wherein the mid-link serveris a System for Cross-Domain Identity Management (SCIM) server, theprogram module is a python module with a SCIMClient class thatfacilitates the integrations with the external application, and the userinterface is a Python Command Line Interface (CLI) tool that allowsadministrators to create or manage SCIM integrations using theSCIMClient class.
 3. The cloud network for automatically provisioninguser and group profiles using directory synchronization in amulti-tenant system as recited in claim 1, wherein the user interface isan executable available in Mac® Operating System and Windows® endpoints.4. The cloud network for automatically provisioning user and groupprofiles using directory synchronization in a multi-tenant system asrecited in claim 1, wherein synchronization of the user directoryprovides group-based reporting, group-based steering/access to specificSoftware as a Service (SaaS) applications, websites, privateapplications, group-based real-time or Application Programming Interface(API)-enabled policies, group-based client configurations and/orgroup-based role-based access control (RBAC) controls.
 5. The cloudnetwork for automatically provisioning user and group profiles usingdirectory synchronization in a multi-tenant system as recited in claim1, wherein an abstraction layer allows administrators to interact withthe mid-link server using the plurality of user attributes.
 6. The cloudnetwork for automatically provisioning user and group profiles usingdirectory synchronization in a multi-tenant system as recited in claim1, wherein the high-risk user is removed from the group of high-riskusers based on a remediation of the threat associated with the high-riskuser.
 7. The cloud network for automatically provisioning user and groupprofiles using directory synchronization in a multi-tenant system asrecited in claim 1, wherein troubleshooting is performed using the userinterface.
 8. A method for automatically configuring user directorybased on user and group policies in a multi-tenant system, the methodcomprising: acquiring a plurality of user attributes for configurationof a user directory, wherein the plurality of user attributes includesemail address, User Principal Name (UPN), and/or username of a pluralityof end-users; acquiring a plurality of groups associated with theplurality of end-users; interacting with a mid-link server using aprogram module and a user interface; wherein: the program moduleintegrates with an external application, and the user interface allowsintegration with the mid-link server, and the user interface leveragesthe program module; creating a snippet for the configuration of the userdirectory using the user interface for each of the plurality ofend-users; determining by the mid-link server, a set of user policiesassociated with the plurality of end-users; determining by the mid-linkserver, a set of group policies associated with the plurality of groups;determining by the mid-link server using the external application, ahigh-risk user from the plurality of end-users and adding the high-riskuser to a group of high-risk users assigned with a lower set ofprivileges for the configuration, wherein specific policies are appliedfor the high-risk user, wherein a threat is determined associated withan end-user of the plurality of end-users based on a type of the threat,a threat level is determined based on the type of the threat, and thethreat level is compared to a threshold level, the threshold levelcategorizes the end-user as the high-risk user; assigning by themid-link server, a higher set of privileges for the configuration to theplurality of end-users excluding the high-risk user; and deploying bythe mid-link server, the user directory using the snippet based on theset of user policies and the set of group policies, wherein theconfiguration of the user directory is based on the set of user policiesand the set of group policies.
 9. The method for automaticallyconfiguring user directory based on user and group policies in amulti-tenant system as recited in claim 8, wherein the mid-link serveris a System for Cross-Domain Identity Management (SCIM) server, theprogram module is a python module with a SCIMClient class thatfacilitates the integrations with the external application, and the userinterface is a Python Command Line Interface (CLI) tool that allowsadministrators to create or manage SCIM integrations using theSCIMClient class.
 10. The method for automatically configuring userdirectory based on user and group policies in a multi-tenant system asrecited in claim 8, wherein the user interface is an executableavailable in Mac® Operating System and Windows® endpoints.
 11. Themethod for automatically configuring user directory based on user andgroup policies in a multi-tenant system as recited in claim 8, whereinsynchronization of the user directory provides group-based reporting,group-based steering/access to specific Software as a Service (SaaS)applications, websites, private applications, group-based real-time orApplication Programming Interface (API)-enabled policies, group-basedclient configurations and/or group-based role-based access control(RBAC) controls.
 12. The method for automatically configuring userdirectory based on user and group policies in a multi-tenant system asrecited in claim 8, wherein an abstraction layer allows administratorsto interact with the mid-link server using the plurality of userattributes.
 13. The method for automatically configuring user directorybased on user and group policies in a multi-tenant system as recited inclaim 8, further comprising removing the high-risk user from the groupof high-risk users based on a remediation of the threat associated withthe high-risk user.
 14. The method for automatically configuring userdirectory based on user and group policies in a multi-tenant system asrecited in claim 8, wherein further comprising resolving a conflictbetween application of the set of user policies and the set of grouppolicies.
 15. A cloud network for policy based provisioning of userdirectory using a program and an interface, the cloud network comprisinga plurality of servers, collectively having code for: acquiring from alocal application configured to execute on an end-user device, aplurality of user attributes for configuration of a user directory,wherein the plurality of user attributes includes email address, UserPrincipal Name (UPN), and/or username of a plurality of end-users;acquiring from the local application configured to execute on theend-user device, a plurality of groups associated with the plurality ofend-users; interacting with a mid-link server using a program module anda user interface; wherein: the program module integrates with anexternal application, and the user interface allows integration with themid-link server, the user interface leverages the program module, and asnippet is created for the configuration of the user directory using theuser interface for each of the plurality of end-users; determining bythe mid-link server, a set of user policies associated with theplurality of end-users; determining by the mid-link server, a set ofgroup policies associated with the plurality of groups; determining bythe mid-link server using the external application, a high-risk userfrom the plurality of end-users and adding the high-risk user to a groupof high-risk users assigned with a lower set of privileges for theconfiguration, wherein specific policies are applied for the high-riskuser, wherein a threat is determined associated with an end-user of theplurality of end-users based on a type of the threat, a threat level isdetermined based on the type of the threat, and the threat level iscompared to a threshold level, the threshold level categorizes theend-user as the high-risk user; assigning by the mid-link server, ahigher set of privileges for the configuration to the plurality ofend-users excluding the high-risk user; and deploying by the mid-linkserver, the user directory using the snippet based on the set of userpolicies and the set of group policies, wherein the configuration of theuser directory is based on the set of user policies and the set of grouppolicies.
 16. The cloud network for policy based provisioning of userdirectory using a program and an interface as recited in claim 15,wherein the mid-link server is a System for Cross-Domain IdentityManagement (SCIM) server, the program module is a python module with aSCIMClient class that facilitates the integrations with the externalapplication, and the user interface is a Python Command Line Interface(CLI) tool that allows administrators to create or manage SCIMintegrations using the SCIMClient class.
 17. The cloud network forpolicy based provisioning of user directory using a program and aninterface as recited in claim 15, wherein the user interface is anexecutable available in Mac® Operating System and Windows® endpoints.18. The cloud network for policy based provisioning of user directoryusing a program and an interface as recited in claim 15, whereinsynchronization of the user directory provides group-based reporting,group-based steering/access to specific Software as a Service (SaaS)applications, websites, private applications, group-based real-time orApplication Programming Interface (API)-enabled policies, group-basedclient configurations and/or group-based role-based access control(RBAC) controls.
 19. The cloud network for policy based provisioning ofuser directory using a program and an interface as recited in claim 15,wherein an abstraction layer allows administrators to interact with themid-link server using the plurality of user attributes.
 20. The cloudnetwork for policy based provisioning of user directory using a programand an interface as recited in claim 15, further comprising removing thehigh-risk user from the group of high-risk users based on a remediationof the threat associated with the high-risk user.