{"id":28338,"date":"2019-12-24T08:26:06","date_gmt":"2019-12-24T13:26:06","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=28338"},"modified":"2023-09-28T11:59:41","modified_gmt":"2023-09-28T15:59:41","slug":"using-microsoft-for-hybrid-identity-options-in-your-iam-environment","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/using-microsoft-for-hybrid-identity-options-in-your-iam-environment\/","title":{"rendered":"Using Microsoft for Hybrid Identity Options in Your IAM Environment"},"content":{"rendered":"
Identity and Access Management Series Part 3<\/strong><\/em><\/a><\/p>\n In this part of our Identity and Access Management (IAM), we explore different design and configuration options for hybrid identity using Microsoft<\/a> solutions. We will try to answer what factors add to the complexity of IAM solutions for your organization.<\/p>\n To show how a modern IAM implementation<\/a> for any organization looks, we discussed Microsoft\u2019s identity components that span on-premise and cloud-based capabilities. Active Directory Federation Service (ADFS on-premise) and Microsoft Azure<\/a> AD (Cloud) are two identity providers from Microsoft which provide authentication mechanism to applications.<\/p>\n Microsoft Azure Active Directory is a modern identity management system spanning cloud and on-premise, providing a common control plane to manage your identities, credentials, devices, applications, and accesses to them.<\/strong> It provides capabilities like synchronization with on-premise directories, SSO to thousands of SaaS applications, machine learning-based security and usage reports, alerting, multi-factor authentication, company branding, self-service password reset, group management delegation, an enterprise-scale service level agreement (SLA), and more which will help provide the level of reliability required by enterprises with advanced needs in identity and access management.<\/p>\n The diagram below provides the modern identity landscape. Our intention with this diagram is to visualize the complexity of IAM<\/a>. The arrows represent the digital identity flow in the form of the federation and claim-based identity, which we discussed in our second blog.<\/p>\n <\/p>\n The rapid increase in usage, number of consumer devices, and universal information access are changing the way people perceive technology and also how technology shapes their personal and work lives. The constant use of technology throughout the day, along with easy access to information, is exceeding the traditional boundaries we discussed in the first blog of this series.<\/strong><\/p>\n Accommodating the consumerization of IT presents a variety of challenges. Conventionally, organizations owned and managed most or all devices their employees use in the workplace. Policies and processes focus on device management and are usually on a relatively small, tightly controlled and managed set of corporate-approved hardware subject to predetermined corporate replacement cycles.<\/p>\nMicrosoft Hybrid Identity Stack<\/h2>\n