{"id":28438,"date":"2020-01-03T09:43:38","date_gmt":"2020-01-03T14:43:38","guid":{"rendered":"https:\/\/centricconsulting.com\/?page_id=28438"},"modified":"2020-01-03T09:50:13","modified_gmt":"2020-01-03T14:50:13","slug":"blog-series-identity-and-access-management","status":"publish","type":"page","link":"https:\/\/centricconsulting.com\/blog-series-identity-and-access-management\/","title":{"rendered":"Blog Series: Identity and Access Management"},"content":{"rendered":"

We completed a four-part blog series about Identity and Access Management (IAM). By now, one thing is clear: for an IAM to work in any enterprise, we must have an interoperable set of standards-based identity, authorization, and authentication tools couple with emerging standards.<\/p>\n

Today, standards from the World Wide Web Consortium (W3C), the FIDO Alliance, the OpenID Foundation (OIDF), the Internet Engineering Task Force (IETF), the Organization for the Advancement of Structured Information Standards (OASIS) and the National Institute of Standards and Technology (NIST) help form a foundation that extends across the web to address authentication, authorization, federation, account management and government regulations emerging worldwide.<\/p>\n

Our Identity and Access Management series identifies that getting an organization to design Identity architecture with the identity standards discussed above will come with a few bumps in the road. <\/strong>There is a solid group of standards aiming at actual enterprise issues in need of solutions.<\/p>\n

We want to define an enterprise-accepted future state architecture that we can tie back to the issues, and associated requirements to what assessment identifies. Once we define these issues, we can develop a roadmap to implement solutions in a cost-effective, time-effective, and security-focused IAM infrastructure.<\/p>\n

The Series<\/h2>\n

Part 1<\/strong>, Planning IAM\u2019s Success for Enterprises and Consumers in Cloud and Digital Transformation Era<\/a>— We discuss how IAM looked a decade ago and then how Federation delegates authentication and removes the siloed app authentication repositories.<\/p>\n

Part 2<\/strong>, Using Claim Based Authentication for Identity and Access Management<\/a>— We explore Claim Based Authentication (CBA) in more detail. We talk about token, claims, and discussed the types of applications. We also note that CBA is more complicated by implementation but is also more secure than authentication mechanisms of the past.<\/p>\n

Part 3<\/strong>, Using Microsoft for Hybrid Identity Options in Your IAM Environment<\/a>— We look at Microsoft\u2019s hybrid identity stack to point out modern identity\u2019s complexity, and the challenges organizations face today. We concluded that the answer to handling the complexity requires a thoughtful and well-designed approach for any IAM project.<\/p>\n

Part 4<\/strong>, Addressing the Complexity of IAM Solutions for Organizations<\/a>— We address why assessing your IAM environment is one of the most critical tasks in today\u2019s digital transformation era. It is essential that enterprises design, configure, and architect their modern IAM solutions per Identity standards<\/strong> and make sure that they secure their design.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

Our IAM series identifies that getting an organization to design Identity architecture with the identity standards come with a few bumps in the road.<\/p>\n","protected":false},"author":232,"featured_media":28443,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"coauthors":[15008],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2024-07-22 09:41:37","action":"change-status","newStatus":"draft","terms":[],"taxonomy":""},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/pages\/28438"}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/232"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=28438"}],"version-history":[{"count":0,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/pages\/28438\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/28443"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=28438"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=28438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}