The More You Know: What's Possible with the Bitium API

API.pngWe created the Bitium API to equip developers with the full functionality of our identity management services. To enhance your team’s experience while using Bitium, here are some helpful things you can do with our API:

#1: Your intranet, our dashboard.

Adding the Bitium dashboard to the one central location that your team is already regularly visiting streamlines their daily workflow and minimizes the friction of rolling out a new tool. With API calls for everything from user’s apps and profiles to organizational groups and events, both individual and administrative dashboards can exist alongside your essential corporate information and services.

#2: Enhance existing security reports with real-time security and access events.

Using the Event Log API, hundreds of security and access events can be integrated into your SIEM tool (Splunk, ArcSight, etc.) for security and compliance monitoring. Our Organizational Insights showcase reports we expect will help inform your security decisions, but with our API, you can also build custom dashboards and data visualizations around your unique business objectives. For example, optimization of app usage and spend can also be achieved by engaging this API for business and web analytics. Or, by feeding events into your existing risk analysis tools, you can investigate and escalate instances of potential access misuse.

#3: Stop hard-coding credentials.

Oftentimes you have the need to put credentials into scripts that run on a server. Instead of hard-coding usernames and passwords, you can actually get the credentials on the fly using Bitium’s KeyVault feature and the API.

#4: Programmatically generate SAML assertions.

Generate SAML assertions programmatically to save time and energy. Once the SAML API is configured, users can be directly authenticated into an app using a token, removing the dependency on passwords and increasing security within your organization. For an example, see how this would work with AWS in the next item.

#5: Establish AWS roles within SAML assertions.

Instead of creating IAM users for AWS, setup a federation relationship between Bitium and AWS with SAML. As a part of this deep integration you can  also define additional attributes within the SAML assertion like user roles to dictate access rights within your AWS instance. Once trust has been established between AWS and Bitium, users in your company will be authenticated into AWS without a password and will seamlessly experience the appropriate level of access based on their designated role. Combine this with #3 above and you can automate AWS access using Bitium’s API.

#6: Build your very own Bitium.

In fact, our developer site provides you with all of the necessary tools to create your very own identity platform. With a high-level of customization, our API enables your unique system to be entirely re-branded and deeply integrated into your existing security infrastructure. For example, if you prefer your identity management tool to sit behind your firewall as an on-premise installation, instead of within the cloud, our API allows that flexibility. This is a big undertaking, so reach out to us first and we’ll find the perfect balance to address your business’ needs.

Explore our developer site and see what customizations would add value to your business. For any assistance along the way, feel free to contact