SlideShare une entreprise Scribd logo
1  sur  27
Allidm.com
Discovering Identity and Access Management Solutions

Identity and Access
Management Introduction
http://academy.allidm.com
Stay connected to Allidm

Find us on Facebook:
http: //www. facebook.com/allidm
Follow us on Twitter:
http: //twitter.com/aidy_idm
Look for us on LinkedIn:
http: //www. linkedin.com/allidm
Visit our blog:
http://www.allidm.com/blog
Disclaimer and Acknowledgments
The contents here are created as a own personal endeavor and
thus does not reflect any official stance of any Identity and
Access Management Vendor on any particular technology
Contact Us
On this presentation we’ll talk about some useful topics that
you can use no matter which identity and access management
solution or product you are working on.
If you know one that make a big difference please tell us to
include it in the future
aidy.allidm@gmail.com
What’s Identity?

Origin
1560–70; < Late Latin identitās, equivalent to Latin ident (
idem ) repeatedly, again and again, earlier *idem et idem (
idem neuter of īdem the same + et and) + -itās –ity

Definition
the distinguishing character or personality of an individual :
individuality
The set of behavioral or personal characteristics by which an
individual is recognizable as a member of a group
Identity

An identity in an identity management system is used
to establish an identity record with attributes

An identity is typically defined by a combination of
Generic attributes, such as firstname, lastname,
address, etc and one or more more specific attributes
that are meaningful to the organization maintaining
the identity details
What’s Identity Management?

According to wikipedia this is the definition
Identity management (IdM) describes the management of
individual identities, their authentication, authorization, roles,
and privileges/permissions within or across system and
enterprise boundaries with the goal of increasing security and
productivity while decreasing cost, downtime, and repetitive
tasks.

“Identity Management" and "Identity and Access
Management " (or IAM) are terms that are used
interchangeably under the title of Identity management.
Identity and Access Management

The growing number of web-enabled applications and
the changing roles of different user communities
creates challenges for the modern enterprise.
These challenges include
controlling access to network resources
maintaining the consistency of user identity between
different applications
making new applications easy to manage.
Why Identity and Access
management is Problem?
Companies typically develop and implement network
applications in individual projects without a common user
repository information.
Each application is deployed with its own provisioning and
identity-management interfaces, and with its own security
systems.
Identity information and security policies are distributed across
many applications, and repositories are controlled by a variety of
internal and external groups.
Administration redundancies can result in inconsistent identity
data across the enterprise, increased operating costs, and an ad
hoc security strategy.
Why Identity and Access
management is Problem?
Environments with disparate sources of identity information
have different approaches for organizing user entries, security
practices, access control, and other essential aspects of
information architecture.
Enterprises with affiliate business and consumer relationships
potentially have user populations that reach into the tens or
hundreds of millions.
When new applications are deployed without a common identity
infrastructure, security decisions are often made in an ad hoc
manner by developers and system administrators.
Inconsistent processes for account deactivation
Why Identity and Access
management is Problem?
Duplication of identity infrastructure functions across
multiple applications, and random security contribute
to operational inefficiencies across the enterprise.
This duplication of effort increases costs, delays time to
market, and reduces revenues.
Why Identity Management?

The number of identities continues to grow.
Identity inside the company
Identify with other partners
Identity on the cloud

Evolution to client/server applications and the
Internet has dramatically increased the number of
identities we have to remember.
Multiple Identities

An Identity Management solution needs to cover one or all of the
next identity types for a person
Single Identity
Multiple Identities
In a university, a person might be a staff member and a student at the
same time.

Service or Batch Identities
Identities used to run some nightly process or any other automated
process.

Cloud Identity
Why an IAM Solution?

Improve the user productivity
Reduce High support costs
Improve Compromised security
Find Compliance deficiencies
Decrease the Corporate dissatisfaction
IAM Solutions on Enterprise

An identity management solutions is typically
integrated in the next system, each with its own
purpose and access requirements
Windows Systems
Unix
Linux
Macintosh
Legacy Systems
IAM Solutions on Enterprise

Also, on these systems may run different applications
Enterprise applications
SAP
PeopleSoft

Databases
Oracle
DB2
SQL Server
Sybase

Other Desktop or Web based applications
Home-grown applications
Custom built by outside developers
IAM Solutions

The identity problem is not resolved with only one solution or
product, usually when is implemented the enterprise might need to
use a combination of them
IAM Solutions might include
Directory Services
To manage the account attributes and organization structure

Access Management
Single Sign On
To manage the Authentication and Authorization for users

Identity Life-cycle Management
To manage Account Provisioning & De-provisioning

Role Management
To manage RBAC
IAM Solutions
IAM Holes

Password Management
remember so many darn passwords.

Orphan Accounts
From a compliance standpoint, orphan accounts are a
major concern since orphan accounts mean that exemployees and former contractors or suppliers still
have legitimate credentials and access to internal
systems
IAM Challenges

Dealing with multiple identities
Dealing with orphan accounts
Managing a lots of manual tasks
Business Processes not well defined
Expectation to make the IdM a data synchronization engine for
application data
Getting all stakeholders to have a common view of area which is
likely to come together and discuss the issues
Lack of leadership and support from sponsors
Deploying too many IdM technologies in a short time period
Lack of consistent architectural vision
Industry Standards

Some standards used to implement IAM Solutions Are:
Security Assertion Markup Language (SAML)
Liberty Alliance Identity Web Services Framework (ID-WSF)
Service Provisioning Markup Language (SPML)
Directory Services Markup Language (DSML)
OASIS eXtensible Access Control Markup Language (XACML)
Lightweight Directory Access Protocol (LDAP)
OAUTH
Simple Cloud Identity Management (SCIM)
Industry Standards

SAML
Defining and maintaining a standard, XML-based
framework for creating and exchanging security
information between online partners
http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=securit
y

ID-WSF
http://projectliberty.org/resources/specifications.php/?f=
resources/specifications.php
Industry Standards

SPML
Providing an XML framework for managing the provisioning and
allocation of identity information and system resources within
and between organizations
http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=provision

DSML
specification to add support for querying and modifying
directories.
http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=dsml
Industry Standards

OAuth
An open protocol to allow secure API authorization in a simple
and standard method from desktop and web applications
http://oauth.net/

SCIM
Designed to make managing user identity in cloud based
applications and services easier. The specification suite seeks to
build upon experience with existing schemas and deployments,
placing specific emphasis on simplicity of development and
integration, while applying existing authentication,
authorization, and privacy models.
http://www.simplecloud.info/
Road map

The IAM solutions are implemented on phases and
usually is a multi year project.
Reference URL’s

http://en.wikipedia.org/wiki/Identity_management
http://www.oasis-open.org/
Allidm.com
Discovering Identity and Access Management Solutions

Allidm Academy
http://academy.allidm.com

Contenu connexe

Tendances

The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 

Tendances (20)

The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Information security
Information securityInformation security
Information security
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Data security
Data securityData security
Data security
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
Access Controls
Access ControlsAccess Controls
Access Controls
 

En vedette

Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.cisoplatform
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity ManagementFraunhofer AISEC
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 

En vedette (7)

Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
IAM Tools
IAM ToolsIAM Tools
IAM Tools
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity Management
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 

Similaire à Identity and Access Management Introduction

TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentationdanhsmith
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single IdentityVladimir Jirasek
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnRiddhi Sood
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications WebinarTodd Clayton
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMAdrian Dumitrescu
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAMGigya
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementEMC
 

Similaire à Identity and Access Management Introduction (20)

IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
SSO introduction
SSO introductionSSO introduction
SSO introduction
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Identity Management In Cloud Computing
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign On
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
 

Plus de Aidy Tificate

Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsAidy Tificate
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager IntroductionAidy Tificate
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureAidy Tificate
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionAidy Tificate
 
Directory Introduction
Directory IntroductionDirectory Introduction
Directory IntroductionAidy Tificate
 
IAM Challenge Questions
IAM Challenge QuestionsIAM Challenge Questions
IAM Challenge QuestionsAidy Tificate
 

Plus de Aidy Tificate (10)

Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM Architecture
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introduction
 
IAM Password
IAM PasswordIAM Password
IAM Password
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Directory Introduction
Directory IntroductionDirectory Introduction
Directory Introduction
 
IAM Challenge Questions
IAM Challenge QuestionsIAM Challenge Questions
IAM Challenge Questions
 
IDM Reconciliation
IDM ReconciliationIDM Reconciliation
IDM Reconciliation
 

Dernier

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 

Dernier (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 

Identity and Access Management Introduction

  • 1. Allidm.com Discovering Identity and Access Management Solutions Identity and Access Management Introduction http://academy.allidm.com
  • 2. Stay connected to Allidm Find us on Facebook: http: //www. facebook.com/allidm Follow us on Twitter: http: //twitter.com/aidy_idm Look for us on LinkedIn: http: //www. linkedin.com/allidm Visit our blog: http://www.allidm.com/blog
  • 3. Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect any official stance of any Identity and Access Management Vendor on any particular technology
  • 4. Contact Us On this presentation we’ll talk about some useful topics that you can use no matter which identity and access management solution or product you are working on. If you know one that make a big difference please tell us to include it in the future aidy.allidm@gmail.com
  • 5. What’s Identity? Origin 1560–70; < Late Latin identitās, equivalent to Latin ident ( idem ) repeatedly, again and again, earlier *idem et idem ( idem neuter of īdem the same + et and) + -itās –ity Definition the distinguishing character or personality of an individual : individuality The set of behavioral or personal characteristics by which an individual is recognizable as a member of a group
  • 6. Identity An identity in an identity management system is used to establish an identity record with attributes An identity is typically defined by a combination of Generic attributes, such as firstname, lastname, address, etc and one or more more specific attributes that are meaningful to the organization maintaining the identity details
  • 7. What’s Identity Management? According to wikipedia this is the definition Identity management (IdM) describes the management of individual identities, their authentication, authorization, roles, and privileges/permissions within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime, and repetitive tasks. “Identity Management" and "Identity and Access Management " (or IAM) are terms that are used interchangeably under the title of Identity management.
  • 8. Identity and Access Management The growing number of web-enabled applications and the changing roles of different user communities creates challenges for the modern enterprise. These challenges include controlling access to network resources maintaining the consistency of user identity between different applications making new applications easy to manage.
  • 9. Why Identity and Access management is Problem? Companies typically develop and implement network applications in individual projects without a common user repository information. Each application is deployed with its own provisioning and identity-management interfaces, and with its own security systems. Identity information and security policies are distributed across many applications, and repositories are controlled by a variety of internal and external groups. Administration redundancies can result in inconsistent identity data across the enterprise, increased operating costs, and an ad hoc security strategy.
  • 10. Why Identity and Access management is Problem? Environments with disparate sources of identity information have different approaches for organizing user entries, security practices, access control, and other essential aspects of information architecture. Enterprises with affiliate business and consumer relationships potentially have user populations that reach into the tens or hundreds of millions. When new applications are deployed without a common identity infrastructure, security decisions are often made in an ad hoc manner by developers and system administrators. Inconsistent processes for account deactivation
  • 11. Why Identity and Access management is Problem? Duplication of identity infrastructure functions across multiple applications, and random security contribute to operational inefficiencies across the enterprise. This duplication of effort increases costs, delays time to market, and reduces revenues.
  • 12. Why Identity Management? The number of identities continues to grow. Identity inside the company Identify with other partners Identity on the cloud Evolution to client/server applications and the Internet has dramatically increased the number of identities we have to remember.
  • 13. Multiple Identities An Identity Management solution needs to cover one or all of the next identity types for a person Single Identity Multiple Identities In a university, a person might be a staff member and a student at the same time. Service or Batch Identities Identities used to run some nightly process or any other automated process. Cloud Identity
  • 14. Why an IAM Solution? Improve the user productivity Reduce High support costs Improve Compromised security Find Compliance deficiencies Decrease the Corporate dissatisfaction
  • 15. IAM Solutions on Enterprise An identity management solutions is typically integrated in the next system, each with its own purpose and access requirements Windows Systems Unix Linux Macintosh Legacy Systems
  • 16. IAM Solutions on Enterprise Also, on these systems may run different applications Enterprise applications SAP PeopleSoft Databases Oracle DB2 SQL Server Sybase Other Desktop or Web based applications Home-grown applications Custom built by outside developers
  • 17. IAM Solutions The identity problem is not resolved with only one solution or product, usually when is implemented the enterprise might need to use a combination of them IAM Solutions might include Directory Services To manage the account attributes and organization structure Access Management Single Sign On To manage the Authentication and Authorization for users Identity Life-cycle Management To manage Account Provisioning & De-provisioning Role Management To manage RBAC
  • 19. IAM Holes Password Management remember so many darn passwords. Orphan Accounts From a compliance standpoint, orphan accounts are a major concern since orphan accounts mean that exemployees and former contractors or suppliers still have legitimate credentials and access to internal systems
  • 20. IAM Challenges Dealing with multiple identities Dealing with orphan accounts Managing a lots of manual tasks Business Processes not well defined Expectation to make the IdM a data synchronization engine for application data Getting all stakeholders to have a common view of area which is likely to come together and discuss the issues Lack of leadership and support from sponsors Deploying too many IdM technologies in a short time period Lack of consistent architectural vision
  • 21. Industry Standards Some standards used to implement IAM Solutions Are: Security Assertion Markup Language (SAML) Liberty Alliance Identity Web Services Framework (ID-WSF) Service Provisioning Markup Language (SPML) Directory Services Markup Language (DSML) OASIS eXtensible Access Control Markup Language (XACML) Lightweight Directory Access Protocol (LDAP) OAUTH Simple Cloud Identity Management (SCIM)
  • 22. Industry Standards SAML Defining and maintaining a standard, XML-based framework for creating and exchanging security information between online partners http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=securit y ID-WSF http://projectliberty.org/resources/specifications.php/?f= resources/specifications.php
  • 23. Industry Standards SPML Providing an XML framework for managing the provisioning and allocation of identity information and system resources within and between organizations http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=provision DSML specification to add support for querying and modifying directories. http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=dsml
  • 24. Industry Standards OAuth An open protocol to allow secure API authorization in a simple and standard method from desktop and web applications http://oauth.net/ SCIM Designed to make managing user identity in cloud based applications and services easier. The specification suite seeks to build upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. http://www.simplecloud.info/
  • 25. Road map The IAM solutions are implemented on phases and usually is a multi year project.
  • 27. Allidm.com Discovering Identity and Access Management Solutions Allidm Academy http://academy.allidm.com