![Lead Image by Timothy Ah Koy on Unsplash Lead Image by Timothy Ah Koy on Unsplash](/var/ezflow_site/storage/images/archive/2018/43/identity-management-from-the-cloud/photobytimothyahkoyonunsplash_31306_dark-cloud-rain.png/148611-1-eng-US/PhotobyTimothyAhKoyonUnsplash_31306_Dark-Cloud-Rain.png_medium.png)
Lead Image by Timothy Ah Koy on Unsplash
Identity Management from the cloud
Under a Dark Cloud
Identity and access management (IAM) is a core IT discipline located between IT infrastructure, information security, and governance (Figure 1). For example, IAM tools help with the management of users and their access rights across systems and (cloud) services, to provide easy access to applications (preferably with a single sign-on experience), to handle strong authentication, and to protect shared user accounts.
IAM Complexity
IAM projects often prove to be complex. As a cross-system tool, IAM requires a connection to existing systems in many areas and, in particular, to the core area of identity provisioning (i.e., the administration of users and their user accounts on the various target systems). These tools require more than just technical connections: They also must be mapped to the correct internal system user accounts.
Other aspects, such as strong and adaptive authentication, are often complex, not in terms of technical integration with existing systems, but because of the high security requirements of this infrastructure. Systems designed to ensure security must be implemented in a secure manner. Adaptive authentication means supporting different authentication mechanisms, taking
...Buy this article as PDF
(incl. VAT)