Identity and Access Management
Identity and Access Management
Overview
2
Universal Identity?
Explosion of IDs
Business Partners
# of Automation (B2B)
Digital IDs
Company
(B2E)
Customers
(B2C)
Mobility
ns
atio Internet
plic
Ap
Client Server
Mainframe
Time
Multiple Contexts
Customer satisfaction & customer intimacy
Cost competitiveness
Reach, personalization
M&A
Mobile/global workforce
Flexible/temp workforce
Pain Points
Security/ Business
IT Admin Developer End User
Compliance Owner
Too many user Redundant Too many Too many Too expensive
stores and code in each passwords orphaned to reach new
account admin app accounts partners,
requests
Long waits for
channels
Rework code access to Limited
Unsafe sync apps, auditing Need for
scripts too often control
resources ability
9
Possible Savings
Directory Synchronization
“Improved updating of user data: $185 per user/year”
“Improved list management: $800 per list”
- Giga Information Group
Password Management
“Password reset costs range from $51 (best case) to $147 (worst
case) for labor alone.” – Gartner
User Provisioning
“Improved IT efficiency: $70,000 per year per 1,000 managed users”
“Reduced help desk costs: $75 per user per year”
- Giga Information Group
10
Better Option:
Build a global, universal, federated identity metasystem
Will take years…
Quicker Option:
Build an in-house, federated identity metasystem based on
standards
Federate it to others, system-by-system
Identity Providers
Organisations, governments, even end-users
They provide Identity Claims about a Subject
Name, vehicles allowed to drive, age, etc.
Relying Parties
Online services or sites, doors, etc.
Subjects
Individuals and other bodies that need its identity
established
16
Metasystem Players
Identity Providers
Issue identities
Relying Parties
Require identities
Subjects
Individuals and other
entities about whom claims
are made
17
Identity Laws
Enterprise Applicability
Enterprise Trends
Role
Manageme
nt
Web Services Provisionin
g
Security
Authorization d it in g&
Au ing
p o r t
Re
t o r ies
c
g D ir e
Digital Stron tion
Rights h e n t ica
Management Aut PKI
23
Identity Integration
•Authentication
•Authorization HR
•Identity Data System
•Authentication
•Authorization Student
IAM Benefits
Authentication (AuthN)
Verification of a subject’s identity by means of relying on a
provided claim
Identification is sometimes seen as a preliminary step of
authentication
Collection of untrusted (as yet) information about a subject, such
as an identity claim
Authorization (AuthZ)
Deciding what actions, rights or privileges can the subject be
allowed
Components of IAM
Administration
User Management
Password Management
Workflow
Access Management
Authentication
Authentication
Administration
Authorization
Authorization
Identity Management
Account Provisioning
Account Deprovisioning
Synchronisation Reliable Identity Data
29
IAM Architecture
30
Roadmap
31