{"id":28338,"date":"2019-12-24T08:26:06","date_gmt":"2019-12-24T13:26:06","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=28338"},"modified":"2023-09-28T11:59:41","modified_gmt":"2023-09-28T15:59:41","slug":"using-microsoft-for-hybrid-identity-options-in-your-iam-environment","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/using-microsoft-for-hybrid-identity-options-in-your-iam-environment\/","title":{"rendered":"Using Microsoft for Hybrid Identity Options in Your IAM Environment"},"content":{"rendered":"

In this multi-part blog series for Identity and Access Management (IAM), we take a look at IAM capabilities, complexity and challenges organizations face today. We also address why assessing your IAM environment is more critical now than ever before.<\/h2>\n
\n

Identity and Access Management Series Part 3<\/strong><\/em><\/a><\/p>\n

In this part of our Identity and Access Management (IAM), we explore different design and configuration options for hybrid identity using Microsoft<\/a> solutions. We will try to answer what factors add to the complexity of IAM solutions for your organization.<\/p>\n

Microsoft Hybrid Identity Stack<\/h2>\n

To show how a modern IAM implementation<\/a> for any organization looks, we discussed Microsoft\u2019s identity components that span on-premise and cloud-based capabilities. Active Directory Federation Service (ADFS on-premise) and Microsoft Azure<\/a> AD (Cloud) are two identity providers from Microsoft which provide authentication mechanism to applications.<\/p>\n

Microsoft Azure Active Directory is a modern identity management system spanning cloud and on-premise, providing a common control plane to manage your identities, credentials, devices, applications, and accesses to them.<\/strong> It provides capabilities like synchronization with on-premise directories, SSO to thousands of SaaS applications, machine learning-based security and usage reports, alerting, multi-factor authentication, company branding, self-service password reset, group management delegation, an enterprise-scale service level agreement (SLA), and more which will help provide the level of reliability required by enterprises with advanced needs in identity and access management.<\/p>\n

The diagram below provides the modern identity landscape. Our intention with this diagram is to visualize the complexity of IAM<\/a>. The arrows represent the digital identity flow in the form of the federation and claim-based identity, which we discussed in our second blog.<\/p>\n

\"\"<\/p>\n

The rapid increase in usage, number of consumer devices, and universal information access are changing the way people perceive technology and also how technology shapes their personal and work lives. The constant use of technology throughout the day, along with easy access to information, is exceeding the traditional boundaries we discussed in the first blog of this series.<\/strong><\/p>\n

Accommodating the consumerization of IT presents a variety of challenges. Conventionally, organizations owned and managed most or all devices their employees use in the workplace. Policies and processes focus on device management and are usually on a relatively small, tightly controlled and managed set of corporate-approved hardware subject to predetermined corporate replacement cycles.<\/p>\n

The diagram above shows the challenge regarding complexity, which brings us to the question: What is the correct way of dealing with this complex IAM challenge<\/a>?<\/strong><\/p>\n

What Adds Complexity to IAM?<\/h2>\n

Consumer-based devices proliferation<\/h4>\n

From an IAM perspective, the number of users for which organizations need to provide secure access continues to increase exponentially, whether they are employees (B2E), other businesses (B2B), or direct customers or consumers (B2C). Users can be internal or external, and they are bringing with them a broad cross-section of devices with a variety of authentication requirements and options.<\/p>\n

Company mergers and acquisitions activity<\/h4>\n

Many organizations continue to grow through mergers and acquisitions, and IAM teams must deal with more than a single province of identities for all applications. This issue poses a significant challenge when trying to secure an identity solution.<\/p>\n

Different identity accessing different applications<\/h4>\n

Identity providers today have identities of employees, non-employees, partners, vendors, and consumers\u2014all needing to access resources (applications). We cannot get away with merely securing on-premise identity stores and shoving both enterprise entities and consumers into one place.<\/strong><\/p>\n

Partner identities bring risk. What happens if the partner\u2019s worker leaves and goes to a competitor? Will the company revoke provided access in time, or will they still have back-door access through an untracked application? Customer and consumer volumes bring access management needs that are orders of magnitude greater than just managing employee access. The scale is entirely different, and the business implications and regulatory requirements increase the complexity of seamless and secure access. IAM capabilities will make sure we meet the goal and still improve customer experience.<\/p>\n

Meeting complex regulations<\/h4>\n

Many applications, particularly consumer-based ones, must follow the GDPR. Every organization must allow individuals to consent to the storing of personal data in compliance with GDPR. Personal individual data relates to anything that identifies a person, and which needs specific compliance for the processing and control of the data and how it is shared. Everyone company that holds and processes personal or individual data <\/span>must implement GDPR. <\/span><\/p>\n

Any company failing to comply with the GDPR can incur a monetary penalty to the company processing or holding the personal data.<\/strong> GDPR gives rights to people (known in the regulation as data subjects) to manage the personal data that has been collected by an employer or other types of agency or organization, known as the data controller.<\/p>\n

The GDPR gives data subjects specific rights to their data; these rights include obtaining copies of it, requesting changes to it, restricting the processing of it, deleting it, or receiving it in an electronic format so it can move to another controller. A formal request by a data subject to a controller to take action on their personal data is called a Data Subject Request or DSR. Regulations like these are pushing organizations\u2019 current legacy IAM solutions beyond their capabilities for better privacy control at both the device and Identity levels.<\/p>\n

Data everywhere<\/h4>\n

When it comes to customer data, it becomes a challenge for organizations to have a single view of the customer or to link customer or consumer data across business units and data silos. However, doing so is critical to securing customer and consumer data and ensuring compliance with industry and governmental regulations.<\/p>\n

How are you protecting sensitive data? What are your practices and processes for registering the applications to IDP, granting and maintaining an entity\u2019s profile, getting consent, and applicable access? Who has access to what data? The answer to these issues requires a thoughtful and well-designed approach to an IAM project.<\/strong><\/p>\n

Identity Strategy<\/h4>\n

Hybrid environments without an identity strategy can create challenges. The complexity of managing identity and access across users, apps, and devices is compounded by the enormous growth in the number of endpoints, the accelerating rate of attacks from a variety of vectors, and increasingly complex operations of securing and managing identity access across and beyond the organization simplifying a complex and chaotic identity environment is not only ideal, but it\u2019s also attainable\u2014through these four steps:<\/p>\n

    \n
  1. Move employees to a single identity to improve productivity<\/li>\n
  2. Reduce management overhead through simpler identity infrastructure<\/li>\n
  3. Monitor anomalous activity for greater security<\/li>\n
  4. Give users the tools to be secure.<\/li>\n<\/ol>\n

    In Conclusion<\/h2>\n

    As the organization finds itself working across on-premises and cloud environments, managing identity, how employees access services, and how IT governs this access can become complicated. In our final blog of the series, we will discuss how to handle this complexity in any organization.
    \n\n

    \n
    \n Want more great content like this? Check out our blog.\n <\/div>\n
    \n \n\n See What\u2019s New\n <\/a>\n <\/div>\n <\/div> <\/p>\n","protected":false},"excerpt":{"rendered":"

    In this part of our Identity and Access Management (IAM), we explore design and configuration options for hybrid identity with Microsoft solutions.<\/p>\n","protected":false},"author":63,"featured_media":28342,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[18559,3758],"coauthors":[15012],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2024-07-22 09:42:28","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/28338"}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=28338"}],"version-history":[{"count":0,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/28338\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/28342"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=28338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=28338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=28338"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=28338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}