![Lead Image © Chatree Jaiyangyuen, 123rf.com Lead Image © Chatree Jaiyangyuen, 123rf.com](/var/ezflow_site/storage/images/archive/2021/61/identity-and-access-management-with-openiam/po-26886-123rf-chatree_jaiyangyuen_123rf-abstract_technology_background_security_system_concept_with_fingerprint_vector_illustration_resized.png/180621-1-eng-US/PO-26886-123RF-Chatree_Jaiyangyuen_123rf-Abstract_technology_background_Security_system_concept_with_fingerprint_Vector_illustration_resized.png_medium.png)
Lead Image © Chatree Jaiyangyuen, 123rf.com
Identity and access management with OpenIAM
Authorization Center
Managing user identities decentrally and manually directly within applications is not only error-prone, it also takes up valuable time and involves administrative overhead. Storing users and their access authorizations for certain systems and applications in a central location makes sense, especially in hybrid environments, where applications exist both on-premises and in various clouds.
Identity and access management (IAM) tools typically provide a number of functions to facilitate this work. Not only does the software provide user lifecycle and access management, it needs to offer other features, such as a self-service portal for resetting user passwords or for additional authorization requests. A single sign-on based on modern protocols such as OpenID Connect or Security Assertion Markup Language 2.0 (SAML2) should also be part of the standard scope. Flexible auditing is necessary to implement compliance requirements for a centralized system of this type, and SAML2 will certainly become interesting for increasing numbers of businesses in the light of data protection regulations (e.g., the European Union's General Data Protection Regulation, GDPR).
Although the vast majority of IAM products support these requirements, they present no uniform implementation approach in practical terms. OpenIAM [1] is a fully integrated platform that manages user identities and access rights, supporting all requirements companies need in a modern IAM tool.
Microservice-Based Architecture
OpenIAM essentially comprises two components: Identity Governance and the Access Manager. To fulfill its task, the software relies completely on a service-oriented architecture (SOA) and uses an enterprise service bus (ESB) for communication between the individual services. To map these two core components of the software, the tool provides more than 20
...Buy this article as PDF
(incl. VAT)