Chapter 4. KIM

Table of Contents

KIM Overview
KIM Features
Person
Person Lookup
Person Maintenance
Displaying the Person Lookup Screen
Ad Hoc Recipients Tab
Route Log Tab
Group
Group Lookup Screen
Group Inquiry Screen
Group Maintenance Document
Role
Role Lookup Screen
Role Maintenance Document
KIM Type
KIM Type Lookup
KIM Type Inquiry
Responsibility
Responsibility Lookup
Responsibility Inquiry
Permission
Permission Lookup
Permission Inquiry
Permission Template Inquiry
Locations
Campus
Postal Code
County
State
Country

KIM Overview

Kuali Identity Management (KIM) provides identity and access management services to Rice and other applications. All KIM services are available on the service bus with both SOAP and Java serialization endpoints. KIM provides a service layer and a set of GUIs that you can use to maintain the identity information.

KIM is designed to be used with both Kuali and non-Kuali applications. The permissions and responsibilities it provides are defined by each user’s Role or Roles in the system. Roles can be customized to handle permissions and responsibilities in a variety of ways based on your particular needs.

Figure 4.1. KIM Architecture

KIM Architecture

KIM Features

  • KIM provides a reference implementation of the services but allows for customization and/or replacement to facilitate integration with institutional services or other third party identity management solutions.

  • KIM allows you to override one or more of its core services. For example, you could override the Identity Service, but not the Role Service.

  • KIM consists of these services, which encompass it’s API:

    • AuthenticationService

    • GroupService

    • GroupUpdateService

    • IdentityCacheService

    • IdentityService

    • IdentityUpdateService

    • PermissionService

    • PersonService

    • ResponsibilityService

    • RoleService

  • KIM evaluates permissions through its permission service. KIM provides plug points for implementing custom logic for permission checking, such as permission checks based on hierarchical data.

A more detailed picture of the KIM architecture:

Figure 4.2. Detailed KIM Achitecture

Detailed KIM Achitecture