{"id":28249,"date":"2019-12-10T12:41:54","date_gmt":"2019-12-10T17:41:54","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=28249"},"modified":"2023-08-30T10:12:00","modified_gmt":"2023-08-30T14:12:00","slug":"planning-iams-success-for-enterprises-and-consumers-in-cloud-and-digital-transformation-era","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/planning-iams-success-for-enterprises-and-consumers-in-cloud-and-digital-transformation-era\/","title":{"rendered":"Planning IAM\u2019s Success for Enterprises and Consumers in Cloud and Digital Transformation Era"},"content":{"rendered":"<h2 style=\"text-align: center;\">In this multi-part blog series for Identity and Access Management (IAM), we take a look at IAM capabilities, complexity and challenges organizations face today. We also address why assessing your IAM environment is more critical now than ever before.<\/h2>\n<hr \/>\n<p><a href=\"https:\/\/centricconsulting.com\/blog-series-identity-and-access-management\/\"><em><strong>Identity and Access Management Series Part 1<\/strong><\/em><\/a><\/p>\n<h2>Setting the Stage<\/h2>\n<p class=\"intro-text\">During previous years of identity management, most identity professionals deployed an on-premise directory domain, which supported common authentication mechanisms such as Kerberos, Negotiate, NTLM, Secure Channel, and Digest. That word \u201cauthentication\u201d is one of the four pillars of an Identity. The other three pillars include administration, authorization, and auditing.<\/p>\n<p>Nowadays, when moving to the cloud, we see these authentication mechanisms are less and less useful to us because the federation is the currency of cloud and edge computing today. Federation supports claims-based identity by providing delegated authentication and delegated authorization.<\/p>\n<p>WS-Fed, SAML, and OAuth are such federation sign-in protocols. <strong>Think of a federation between two organizations like the watered-down version of an Active Directory trust between two domains.<\/strong> We started with identity terminology, but keep reading as we dive deeper into supporting topics.<\/p>\n<h2>Identity and Access Management a Decade Ago<\/h2>\n<p>A decade ago, most enterprises had a traditional, centralized IT department delivering capabilities to the business in a highly controlled and locked-down fashion. A typical \u201con-premise\u201d network perimeter consisted of an Active Directory and Domain joined servers in a company\u2019s data center. Sound familiar?<\/p>\n<p><strong>Active Directory, or some form of another directory, allows users and the computers of an organization to authenticate against resources in the same forest.<\/strong> Or, if there were two forests, via setting up a trust between those forests. On-premise was considered a trusted perimeter. Anything outside the network fell into a hostile category. Authentication in this perimeter then used to be Basic, Digest, Windows Authentication, or forms-based authentication. The below diagram depicts a traditional on-premise IT model.<\/p>\n<p><a href=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-28253 size-full\" src=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-1.png\" alt=\"IAM Digital Transformation 1\" width=\"785\" height=\"329\" srcset=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-1.png 785w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-1-300x126.png 300w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-1-768x322.png 768w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-1-600x251.png 600w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-1-750x314.png 750w\" sizes=\"auto, (max-width: 785px) 100vw, 785px\" \/><\/a><\/p>\n<h2>Identity and Access Management Today<\/h2>\n<p>Today, the challenges of securing our environment, particularly from the IAM perspective, is at the top of every organization\u2019s priority list regardless of a company\u2019s size. Identity and Access Management continues to be highly complex, increasing in scope. Digital Transformation initiatives bring about several complexities that did not exist 10 to 15 years ago. Environments are more diverse now. Companies are moving their assets to the cloud.<\/p>\n<p>The diagram below shows the <strong>evolving identity challenges in the 21st century<\/strong>. Identity solutions cover on-premise and cloud-based capabilities. These solutions create a common user identity for authentication and authorization to all resources, regardless of location. We call this hybrid identity, which we will discuss a little later.<\/p>\n<p><a href=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-28254 size-full\" src=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-2.png\" alt=\"IAM Digital Transformation Image 2\" width=\"895\" height=\"300\" srcset=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-2.png 895w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-2-300x101.png 300w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-2-768x257.png 768w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-2-600x201.png 600w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-2-850x285.png 850w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-2-750x251.png 750w\" sizes=\"auto, (max-width: 895px) 100vw, 895px\" \/><\/a><\/p>\n<h2>Today\u2019s Identity Challenges<\/h2>\n<p>Authentication mechanisms used in the past are no longer effective for today\u2019s cloud and edge focused IoT world. We must leverage alternative identity management approaches to address the increasingly complex landscape. Users with any device (PC, mobiles, and more), anyplace, anytime want to access their application. <strong>Challenges in an organization continue to grow as users BYOD (Bring Your Own Devices) and access applications residing anywhere, inside or outside the perimeter, including user\u2019s data.<\/strong> Think about IoT devices in the mix and it makes the above scenario gets even more complex.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-46326\" src=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-3-1-300x123.jpg\" alt=\"\" width=\"773\" height=\"317\" srcset=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-3-1-300x123.jpg 300w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-3-1-768x315.jpg 768w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-3-1-600x246.jpg 600w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-3-1-992x407.jpg 992w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-3-1-850x349.jpg 850w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-3-1-750x308.jpg 750w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-3-1.jpg 1008w\" sizes=\"auto, (max-width: 773px) 100vw, 773px\" \/><\/p>\n<h2>Hybrid Identity<\/h2>\n<p><strong>The most common hybrid identity scenarios we hear in our day to day activities are, for example:<\/strong><\/p>\n<ul>\n<li>Providing employee access to <a href=\"https:\/\/centricconsulting.com\/technology-solutions\/enterprise-collaboration\/microsoft-teams-consulting\/\">Office 365<\/a><\/li>\n<li>Integrating with third-party applications and services<\/li>\n<li>Building new applications or moving existing applications into <a href=\"https:\/\/centricconsulting.com\/technology-solutions\/cloud-computing\/\">the cloud<\/a><\/li>\n<li>Providing access to business partners and consumers, which is B2B (Business to Business) and B2C (Business to Consumer), respectively.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-28256 size-full\" src=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-4.png\" alt=\"IAM Digital Transformation Image 4\" width=\"902\" height=\"474\" srcset=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-4.png 902w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-4-300x158.png 300w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-4-768x404.png 768w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-4-600x315.png 600w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-4-850x447.png 850w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2019\/12\/IAM-image-4-750x394.png 750w\" sizes=\"auto, (max-width: 902px) 100vw, 902px\" \/><\/a><\/p>\n<p><strong>There are four primary user identity scenarios across on-premise and cloud.<\/strong><\/p>\n<ul>\n<li>Cloud identity provides a solution where all identities, including passwords, live in the cloud. In this scenario, authentication happens in the cloud.<\/li>\n<li>Identity sync enables customers to bridge their existing identity into the cloud, passwords are in synchronization between on-premise and the cloud, and therefore authentication can occur in either location (depending on what resource is accessed).<\/li>\n<li>Federated identity allows customers to retain the application\u2019s authentication process to occur on-premise, where the passwords are stored via Active Directory Federation Services (ADFS).<\/li>\n<li>B2B federated identity allows customers to securely share and collaborate, with each side delegating access to the other resources.<\/li>\n<\/ul>\n<h2>In Conclusion<\/h2>\n<p>To make a hybrid identity work, we heavily leverage identity federation. <strong>Federation delegates authentication and, therefore, removes the siloed app authentication repositories. It lessens identity management responsibilities for the apps, and it also allows users to leverage an existing identity.<\/strong> Federation also helps in delegating authorization. Applications can change authorization data as appropriate.<\/p>\n<p>Like Hybrid Identity, it is important to add the term \u201cDecentralized Identity,\u201d which we shall cover in our future blog, however, in our next blog, we will introduce Claim Based Authentication (CBA), which provides the foundation of how federation works.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this multi-part blog series for Identity and Access Management (IAM), we take a look at IAM capabilities, complexity and challenges for organizations.<\/p>\n","protected":false},"author":63,"featured_media":28251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[18527],"coauthors":[15012],"class_list":["post-28249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cloud-computing","resource-categories-blogs","orbitmedia_post_topic-cloud-solutions","orbitmedia_post_topic-modern-software-delivery"],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2025-12-05 06:43:03","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/28249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=28249"}],"version-history":[{"count":0,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/28249\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/28251"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=28249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=28249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=28249"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=28249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}