{"id":28249,"date":"2019-12-10T12:41:54","date_gmt":"2019-12-10T17:41:54","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=28249"},"modified":"2023-08-30T10:12:00","modified_gmt":"2023-08-30T14:12:00","slug":"planning-iams-success-for-enterprises-and-consumers-in-cloud-and-digital-transformation-era","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/planning-iams-success-for-enterprises-and-consumers-in-cloud-and-digital-transformation-era\/","title":{"rendered":"Planning IAM\u2019s Success for Enterprises and Consumers in Cloud and Digital Transformation Era"},"content":{"rendered":"

In this multi-part blog series for Identity and Access Management (IAM), we take a look at IAM capabilities, complexity and challenges organizations face today. We also address why assessing your IAM environment is more critical now than ever before.<\/h2>\n
\n

Identity and Access Management Series Part 1<\/strong><\/em><\/a><\/p>\n

Setting the Stage<\/h2>\n

During previous years of identity management, most identity professionals deployed an on-premise directory domain, which supported common authentication mechanisms such as Kerberos, Negotiate, NTLM, Secure Channel, and Digest. That word \u201cauthentication\u201d is one of the four pillars of an Identity. The other three pillars include administration, authorization, and auditing.<\/p>\n

Nowadays, when moving to the cloud, we see these authentication mechanisms are less and less useful to us because the federation is the currency of cloud and edge computing today. Federation supports claims-based identity by providing delegated authentication and delegated authorization.<\/p>\n

WS-Fed, SAML, and OAuth are such federation sign-in protocols. Think of a federation between two organizations like the watered-down version of an Active Directory trust between two domains.<\/strong> We started with identity terminology, but keep reading as we dive deeper into supporting topics.<\/p>\n

Identity and Access Management a Decade Ago<\/h2>\n

A decade ago, most enterprises had a traditional, centralized IT department delivering capabilities to the business in a highly controlled and locked-down fashion. A typical \u201con-premise\u201d network perimeter consisted of an Active Directory and Domain joined servers in a company\u2019s data center. Sound familiar?<\/p>\n

Active Directory, or some form of another directory, allows users and the computers of an organization to authenticate against resources in the same forest.<\/strong> Or, if there were two forests, via setting up a trust between those forests. On-premise was considered a trusted perimeter. Anything outside the network fell into a hostile category. Authentication in this perimeter then used to be Basic, Digest, Windows Authentication, or forms-based authentication. The below diagram depicts a traditional on-premise IT model.<\/p>\n

\"IAM<\/a><\/p>\n

Identity and Access Management Today<\/h2>\n

Today, the challenges of securing our environment, particularly from the IAM perspective, is at the top of every organization\u2019s priority list regardless of a company\u2019s size. Identity and Access Management continues to be highly complex, increasing in scope. Digital Transformation initiatives bring about several complexities that did not exist 10 to 15 years ago. Environments are more diverse now. Companies are moving their assets to the cloud.<\/p>\n

The diagram below shows the evolving identity challenges in the 21st century<\/strong>. Identity solutions cover on-premise and cloud-based capabilities. These solutions create a common user identity for authentication and authorization to all resources, regardless of location. We call this hybrid identity, which we will discuss a little later.<\/p>\n

\"IAM<\/a><\/p>\n

Today\u2019s Identity Challenges<\/h2>\n

Authentication mechanisms used in the past are no longer effective for today\u2019s cloud and edge focused IoT world. We must leverage alternative identity management approaches to address the increasingly complex landscape. Users with any device (PC, mobiles, and more), anyplace, anytime want to access their application. Challenges in an organization continue to grow as users BYOD (Bring Your Own Devices) and access applications residing anywhere, inside or outside the perimeter, including user\u2019s data.<\/strong> Think about IoT devices in the mix and it makes the above scenario gets even more complex.<\/p>\n

\"\"<\/p>\n

Hybrid Identity<\/h2>\n

The most common hybrid identity scenarios we hear in our day to day activities are, for example:<\/strong><\/p>\n