SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Allidm.com
Discovering Identity and Access Management Solutions

Identity and Access
Management Introduction
http://academy.allidm.com
Stay connected to Allidm

Find us on Facebook:
http: //www. facebook.com/allidm
Follow us on Twitter:
http: //twitter.com/aidy_idm
Look for us on LinkedIn:
http: //www. linkedin.com/allidm
Visit our blog:
http://www.allidm.com/blog
Disclaimer and Acknowledgments
The contents here are created as a own personal endeavor and
thus does not reflect any official stance of any Identity and
Access Management Vendor on any particular technology
Contact Us
On this presentation we’ll talk about some useful topics that
you can use no matter which identity and access management
solution or product you are working on.
If you know one that make a big difference please tell us to
include it in the future
aidy.allidm@gmail.com
What’s Identity?

Origin
1560–70; < Late Latin identitās, equivalent to Latin ident (
idem ) repeatedly, again and again, earlier *idem et idem (
idem neuter of īdem the same + et and) + -itās –ity

Definition
the distinguishing character or personality of an individual :
individuality
The set of behavioral or personal characteristics by which an
individual is recognizable as a member of a group
Identity

An identity in an identity management system is used
to establish an identity record with attributes

An identity is typically defined by a combination of
Generic attributes, such as firstname, lastname,
address, etc and one or more more specific attributes
that are meaningful to the organization maintaining
the identity details
What’s Identity Management?

According to wikipedia this is the definition
Identity management (IdM) describes the management of
individual identities, their authentication, authorization, roles,
and privileges/permissions within or across system and
enterprise boundaries with the goal of increasing security and
productivity while decreasing cost, downtime, and repetitive
tasks.

“Identity Management" and "Identity and Access
Management " (or IAM) are terms that are used
interchangeably under the title of Identity management.
Identity and Access Management

The growing number of web-enabled applications and
the changing roles of different user communities
creates challenges for the modern enterprise.
These challenges include
controlling access to network resources
maintaining the consistency of user identity between
different applications
making new applications easy to manage.
Why Identity and Access
management is Problem?
Companies typically develop and implement network
applications in individual projects without a common user
repository information.
Each application is deployed with its own provisioning and
identity-management interfaces, and with its own security
systems.
Identity information and security policies are distributed across
many applications, and repositories are controlled by a variety of
internal and external groups.
Administration redundancies can result in inconsistent identity
data across the enterprise, increased operating costs, and an ad
hoc security strategy.
Why Identity and Access
management is Problem?
Environments with disparate sources of identity information
have different approaches for organizing user entries, security
practices, access control, and other essential aspects of
information architecture.
Enterprises with affiliate business and consumer relationships
potentially have user populations that reach into the tens or
hundreds of millions.
When new applications are deployed without a common identity
infrastructure, security decisions are often made in an ad hoc
manner by developers and system administrators.
Inconsistent processes for account deactivation
Why Identity and Access
management is Problem?
Duplication of identity infrastructure functions across
multiple applications, and random security contribute
to operational inefficiencies across the enterprise.
This duplication of effort increases costs, delays time to
market, and reduces revenues.
Why Identity Management?

The number of identities continues to grow.
Identity inside the company
Identify with other partners
Identity on the cloud

Evolution to client/server applications and the
Internet has dramatically increased the number of
identities we have to remember.
Multiple Identities

An Identity Management solution needs to cover one or all of the
next identity types for a person
Single Identity
Multiple Identities
In a university, a person might be a staff member and a student at the
same time.

Service or Batch Identities
Identities used to run some nightly process or any other automated
process.

Cloud Identity
Why an IAM Solution?

Improve the user productivity
Reduce High support costs
Improve Compromised security
Find Compliance deficiencies
Decrease the Corporate dissatisfaction
IAM Solutions on Enterprise

An identity management solutions is typically
integrated in the next system, each with its own
purpose and access requirements
Windows Systems
Unix
Linux
Macintosh
Legacy Systems
IAM Solutions on Enterprise

Also, on these systems may run different applications
Enterprise applications
SAP
PeopleSoft

Databases
Oracle
DB2
SQL Server
Sybase

Other Desktop or Web based applications
Home-grown applications
Custom built by outside developers
IAM Solutions

The identity problem is not resolved with only one solution or
product, usually when is implemented the enterprise might need to
use a combination of them
IAM Solutions might include
Directory Services
To manage the account attributes and organization structure

Access Management
Single Sign On
To manage the Authentication and Authorization for users

Identity Life-cycle Management
To manage Account Provisioning & De-provisioning

Role Management
To manage RBAC
IAM Solutions
IAM Holes

Password Management
remember so many darn passwords.

Orphan Accounts
From a compliance standpoint, orphan accounts are a
major concern since orphan accounts mean that exemployees and former contractors or suppliers still
have legitimate credentials and access to internal
systems
IAM Challenges

Dealing with multiple identities
Dealing with orphan accounts
Managing a lots of manual tasks
Business Processes not well defined
Expectation to make the IdM a data synchronization engine for
application data
Getting all stakeholders to have a common view of area which is
likely to come together and discuss the issues
Lack of leadership and support from sponsors
Deploying too many IdM technologies in a short time period
Lack of consistent architectural vision
Industry Standards

Some standards used to implement IAM Solutions Are:
Security Assertion Markup Language (SAML)
Liberty Alliance Identity Web Services Framework (ID-WSF)
Service Provisioning Markup Language (SPML)
Directory Services Markup Language (DSML)
OASIS eXtensible Access Control Markup Language (XACML)
Lightweight Directory Access Protocol (LDAP)
OAUTH
Simple Cloud Identity Management (SCIM)
Industry Standards

SAML
Defining and maintaining a standard, XML-based
framework for creating and exchanging security
information between online partners
http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=securit
y

ID-WSF
http://projectliberty.org/resources/specifications.php/?f=
resources/specifications.php
Industry Standards

SPML
Providing an XML framework for managing the provisioning and
allocation of identity information and system resources within
and between organizations
http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=provision

DSML
specification to add support for querying and modifying
directories.
http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=dsml
Industry Standards

OAuth
An open protocol to allow secure API authorization in a simple
and standard method from desktop and web applications
http://oauth.net/

SCIM
Designed to make managing user identity in cloud based
applications and services easier. The specification suite seeks to
build upon experience with existing schemas and deployments,
placing specific emphasis on simplicity of development and
integration, while applying existing authentication,
authorization, and privacy models.
http://www.simplecloud.info/
Road map

The IAM solutions are implemented on phases and
usually is a multi year project.
Reference URL’s

http://en.wikipedia.org/wiki/Identity_management
http://www.oasis-open.org/
Allidm.com
Discovering Identity and Access Management Solutions

Allidm Academy
http://academy.allidm.com

Weitere ähnliche Inhalte

Was ist angesagt?

Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
Patch Management Best Practices
Patch Management Best Practices Patch Management Best Practices
Patch Management Best Practices Ivanti
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 

Was ist angesagt? (20)

Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Patch Management Best Practices
Patch Management Best Practices Patch Management Best Practices
Patch Management Best Practices
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 

Ähnlich wie Identity and Access Management Introduction

TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentationdanhsmith
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single IdentityVladimir Jirasek
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnRiddhi Sood
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications WebinarTodd Clayton
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMAdrian Dumitrescu
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAMGigya
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementEMC
 
Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram Sandeep Kumar Seeram
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 

Ähnlich wie Identity and Access Management Introduction (20)

IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Identity Management In Cloud Computing
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign On
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
 
Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 

Mehr von Aidy Tificate

Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsAidy Tificate
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager IntroductionAidy Tificate
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureAidy Tificate
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionAidy Tificate
 
Directory Introduction
Directory IntroductionDirectory Introduction
Directory IntroductionAidy Tificate
 
IAM Challenge Questions
IAM Challenge QuestionsIAM Challenge Questions
IAM Challenge QuestionsAidy Tificate
 

Mehr von Aidy Tificate (11)

Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM Architecture
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introduction
 
IAM Password
IAM PasswordIAM Password
IAM Password
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Directory Introduction
Directory IntroductionDirectory Introduction
Directory Introduction
 
IAM Challenge Questions
IAM Challenge QuestionsIAM Challenge Questions
IAM Challenge Questions
 
IDM Reconciliation
IDM ReconciliationIDM Reconciliation
IDM Reconciliation
 
IAM Tools
IAM ToolsIAM Tools
IAM Tools
 

Kürzlich hochgeladen

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Kürzlich hochgeladen (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

Identity and Access Management Introduction

  • 1. Allidm.com Discovering Identity and Access Management Solutions Identity and Access Management Introduction http://academy.allidm.com
  • 2. Stay connected to Allidm Find us on Facebook: http: //www. facebook.com/allidm Follow us on Twitter: http: //twitter.com/aidy_idm Look for us on LinkedIn: http: //www. linkedin.com/allidm Visit our blog: http://www.allidm.com/blog
  • 3. Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect any official stance of any Identity and Access Management Vendor on any particular technology
  • 4. Contact Us On this presentation we’ll talk about some useful topics that you can use no matter which identity and access management solution or product you are working on. If you know one that make a big difference please tell us to include it in the future aidy.allidm@gmail.com
  • 5. What’s Identity? Origin 1560–70; < Late Latin identitās, equivalent to Latin ident ( idem ) repeatedly, again and again, earlier *idem et idem ( idem neuter of īdem the same + et and) + -itās –ity Definition the distinguishing character or personality of an individual : individuality The set of behavioral or personal characteristics by which an individual is recognizable as a member of a group
  • 6. Identity An identity in an identity management system is used to establish an identity record with attributes An identity is typically defined by a combination of Generic attributes, such as firstname, lastname, address, etc and one or more more specific attributes that are meaningful to the organization maintaining the identity details
  • 7. What’s Identity Management? According to wikipedia this is the definition Identity management (IdM) describes the management of individual identities, their authentication, authorization, roles, and privileges/permissions within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime, and repetitive tasks. “Identity Management" and "Identity and Access Management " (or IAM) are terms that are used interchangeably under the title of Identity management.
  • 8. Identity and Access Management The growing number of web-enabled applications and the changing roles of different user communities creates challenges for the modern enterprise. These challenges include controlling access to network resources maintaining the consistency of user identity between different applications making new applications easy to manage.
  • 9. Why Identity and Access management is Problem? Companies typically develop and implement network applications in individual projects without a common user repository information. Each application is deployed with its own provisioning and identity-management interfaces, and with its own security systems. Identity information and security policies are distributed across many applications, and repositories are controlled by a variety of internal and external groups. Administration redundancies can result in inconsistent identity data across the enterprise, increased operating costs, and an ad hoc security strategy.
  • 10. Why Identity and Access management is Problem? Environments with disparate sources of identity information have different approaches for organizing user entries, security practices, access control, and other essential aspects of information architecture. Enterprises with affiliate business and consumer relationships potentially have user populations that reach into the tens or hundreds of millions. When new applications are deployed without a common identity infrastructure, security decisions are often made in an ad hoc manner by developers and system administrators. Inconsistent processes for account deactivation
  • 11. Why Identity and Access management is Problem? Duplication of identity infrastructure functions across multiple applications, and random security contribute to operational inefficiencies across the enterprise. This duplication of effort increases costs, delays time to market, and reduces revenues.
  • 12. Why Identity Management? The number of identities continues to grow. Identity inside the company Identify with other partners Identity on the cloud Evolution to client/server applications and the Internet has dramatically increased the number of identities we have to remember.
  • 13. Multiple Identities An Identity Management solution needs to cover one or all of the next identity types for a person Single Identity Multiple Identities In a university, a person might be a staff member and a student at the same time. Service or Batch Identities Identities used to run some nightly process or any other automated process. Cloud Identity
  • 14. Why an IAM Solution? Improve the user productivity Reduce High support costs Improve Compromised security Find Compliance deficiencies Decrease the Corporate dissatisfaction
  • 15. IAM Solutions on Enterprise An identity management solutions is typically integrated in the next system, each with its own purpose and access requirements Windows Systems Unix Linux Macintosh Legacy Systems
  • 16. IAM Solutions on Enterprise Also, on these systems may run different applications Enterprise applications SAP PeopleSoft Databases Oracle DB2 SQL Server Sybase Other Desktop or Web based applications Home-grown applications Custom built by outside developers
  • 17. IAM Solutions The identity problem is not resolved with only one solution or product, usually when is implemented the enterprise might need to use a combination of them IAM Solutions might include Directory Services To manage the account attributes and organization structure Access Management Single Sign On To manage the Authentication and Authorization for users Identity Life-cycle Management To manage Account Provisioning & De-provisioning Role Management To manage RBAC
  • 19. IAM Holes Password Management remember so many darn passwords. Orphan Accounts From a compliance standpoint, orphan accounts are a major concern since orphan accounts mean that exemployees and former contractors or suppliers still have legitimate credentials and access to internal systems
  • 20. IAM Challenges Dealing with multiple identities Dealing with orphan accounts Managing a lots of manual tasks Business Processes not well defined Expectation to make the IdM a data synchronization engine for application data Getting all stakeholders to have a common view of area which is likely to come together and discuss the issues Lack of leadership and support from sponsors Deploying too many IdM technologies in a short time period Lack of consistent architectural vision
  • 21. Industry Standards Some standards used to implement IAM Solutions Are: Security Assertion Markup Language (SAML) Liberty Alliance Identity Web Services Framework (ID-WSF) Service Provisioning Markup Language (SPML) Directory Services Markup Language (DSML) OASIS eXtensible Access Control Markup Language (XACML) Lightweight Directory Access Protocol (LDAP) OAUTH Simple Cloud Identity Management (SCIM)
  • 22. Industry Standards SAML Defining and maintaining a standard, XML-based framework for creating and exchanging security information between online partners http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=securit y ID-WSF http://projectliberty.org/resources/specifications.php/?f= resources/specifications.php
  • 23. Industry Standards SPML Providing an XML framework for managing the provisioning and allocation of identity information and system resources within and between organizations http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=provision DSML specification to add support for querying and modifying directories. http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=dsml
  • 24. Industry Standards OAuth An open protocol to allow secure API authorization in a simple and standard method from desktop and web applications http://oauth.net/ SCIM Designed to make managing user identity in cloud based applications and services easier. The specification suite seeks to build upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. http://www.simplecloud.info/
  • 25. Road map The IAM solutions are implemented on phases and usually is a multi year project.
  • 27. Allidm.com Discovering Identity and Access Management Solutions Allidm Academy http://academy.allidm.com