{"id":28315,"date":"2019-12-17T12:03:39","date_gmt":"2019-12-17T17:03:39","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=28315"},"modified":"2021-12-15T00:16:59","modified_gmt":"2021-12-15T05:16:59","slug":"using-claim-based-authentication-for-identity-and-access-management","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/using-claim-based-authentication-for-identity-and-access-management\/","title":{"rendered":"Using Claim Based Authentication for Identity and Access Management"},"content":{"rendered":"

In this multi-part blog series for Identity and Access Management (IAM), we take a look at IAM capabilities, complexity and challenges organizations face today. We also address why assessing your IAM environment is more critical now than ever before.<\/h2>\n
\n

Identity and Access Management Series Part 2<\/strong><\/em><\/a><\/p>\n

In this part of the blog series for Identity and Access Management (IAM), we explore Claim Based Authentication (CBA) in more detail. CBA is more complicated by implementation but is more secure than authentication mechanisms of the past.<\/p>\n

Claim Based Authentication<\/h2>\n

Claim based identity helps us understand the federation concept we discussed earlier. Applications often referred to as the \u201crelying party\u201d must trust the Identity Provider and often refer to as Security Token Services (STS) (Azure AD, ADFS, Ping Identity, octa, and more) to:<\/p>\n