SlideShare a Scribd company logo
1 of 24
7 modern trends every IT professional
must know about (Part 2/7)
cc: slworking2 - https://www.flickr.com/photos/18548283@N00
Centralisation of IAM (Identity and Access Management)
cc: Thomas Hawk - https://www.flickr.com/photos/51035555243@N01
Most applications need some authentication system to
identify users and manage access to different parts of
the app
cc: perspec_photo88 - https://www.flickr.com/photos/111692634@N04
This is called IAM (Identity and
Access Management)
cc: Sarah M Stewart - https://www.flickr.com/photos/92632631@N00
If the user is an enterprise employee it is done via
Employee IAM and for public facing resources used by
customers it is done via the Customer IAM
cc: aaronvandorn - https://www.flickr.com/photos/94197248@N02
Most applications need IAM and hence
changes in IAM will affect most
application developers.cc: rmlowe - https://www.flickr.com/photos/8143486@N04
IAM is handled traditionally by application developers
themselves - mostly by sticking a password form at the
gateway of the application - Challenging users to prove their
identity.
cc: Bruno Santos - https://www.flickr.com/photos/65062705@N00
That has resulted in fragmented IAM with every
application storing user passwords and implementing
their own security policies.
cc: the justified sinner - https://www.flickr.com/photos/54799099@N00
From the developer perspective IAM was a
necessary evil - the application was their focus of
course and not the IAM.
cc: kirainet - https://www.flickr.com/photos/69078600@N00
Most developers just stored passwords in a database and checked
against that database at login time issuing tokens, cookies or
session ids to the client for further identification and access
management.
cc: jeff_golden - https://www.flickr.com/photos/46868900@N00
This had an adverse impact on security esp. since users used
the same passwords on multiple sites and security breaches
and stolen passwords on one system affected many others.
cc: Visual Content - https://www.flickr.com/photos/143601516@N03
This fragmentation of IAM, lack of focus on security
and lack of focus on user experience in the
authentication process was problematic. But that is
changing now.
cc: basykes - https://www.flickr.com/photos/11399912@N00
IAM is getting centralised - with standards like
"OpenID Connect" on top of “Oauth 2.0" protocol that
provide the flow needed for "OpenID Connect"
cc: Jim Nix / Nomadic Pursuits - https://www.flickr.com/photos/34825346@N02
For application developers this means that they no
longer have to worry about authenticating users or
handling IAM. It can now be delegated to Identity
providers.cc: sk8geek - https://www.flickr.com/photos/26170836@N05
This centralisation of the IAM means that application
developers do not have to do policy making for
security and no more login forms of course.
cc: AJ Batac - https://www.flickr.com/photos/89309115@N00
The best part is perhaps - No more need to
store passwords by developers of individual
applications.
cc: The Daring Librarian - https://www.flickr.com/photos/43666171@N07
This also means that users are more in control of their
identity and can grant or revoke permissions given to
any application - all from one place.
cc: sp3ccylad - https://www.flickr.com/photos/46978810@N00
The user experience is now centralised into the hands of ID
providers whose focus is on security, UX and the IAM
process. Centralisation will lead to better UX and better
security.
cc: Daniel Kulinski - https://www.flickr.com/photos/7729940@N06
Application developers can use the flows provided by
Oauth 2.0 to obtain ID tokens and use these signed ID
Tokens to identify the user throughout the app.
cc: vintagedept - https://www.flickr.com/photos/42826854@N00
Since ID providers specialise in IAM, they can evolve
over a period and can integrate with biometric systems
and other password-less systems to make the auth
process better.cc: hawaii - https://www.flickr.com/photos/35034363370@N01
These improvements will automatically be
shared by all applications that use that IDp
because of centralisation.
cc: ryancr - https://www.flickr.com/photos/33128961@N00
Also all security and other policies can now be controlled
from one place. Which apps should be used by which users
can be controlled at one single point by "Single Sign on
(SSO)”
cc: andrechinn - https://www.flickr.com/photos/16167252@N00
The proliferation of cloud apps and also mobile apps
has led to this major paradigm shift in IAM and has
been facilitated by OAuth 2.0 protocol and OpenID
Connect.cc: Matthew Burpee - https://www.flickr.com/photos/76323119@N00
Next part of 7 modern trends every IT
professional must know about
cc: yourbartender - https://www.flickr.com/photos/10164012@N00

More Related Content

What's hot

Magnify your user experience with lightning flow
Magnify your user experience with lightning flowMagnify your user experience with lightning flow
Magnify your user experience with lightning flowNitesh Singh
 
The Integrations Behind Connecting With Salesforce
The Integrations Behind Connecting With SalesforceThe Integrations Behind Connecting With Salesforce
The Integrations Behind Connecting With SalesforceAaronLieberman5
 
Mule Salesforce Connector
Mule Salesforce ConnectorMule Salesforce Connector
Mule Salesforce ConnectorAnkush Sharma
 
Integration of linked in using mule esb
Integration of linked in using mule esbIntegration of linked in using mule esb
Integration of linked in using mule esbSanjeet Pandey
 
Salesforce World Tour 2016 : Lightning Out : Components on any Platform
Salesforce World Tour 2016 : Lightning Out : Components on any PlatformSalesforce World Tour 2016 : Lightning Out : Components on any Platform
Salesforce World Tour 2016 : Lightning Out : Components on any Platformandyinthecloud
 
Slack connector with in MULE
Slack connector with in MULESlack connector with in MULE
Slack connector with in MULED.Rajesh Kumar
 
Hop on the serverless adventure - International Javascript London
Hop on the serverless adventure - International Javascript LondonHop on the serverless adventure - International Javascript London
Hop on the serverless adventure - International Javascript LondonSimona Cotin
 
Query in share point by mule
Query in share point by muleQuery in share point by mule
Query in share point by muleSon Nguyen
 
Create object in amazon
Create object in amazonCreate object in amazon
Create object in amazonSon Nguyen
 
Lighnting component development
Lighnting component developmentLighnting component development
Lighnting component developmentMohith Shrivastava
 
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...Amit Singh
 

What's hot (12)

Magnify your user experience with lightning flow
Magnify your user experience with lightning flowMagnify your user experience with lightning flow
Magnify your user experience with lightning flow
 
The Integrations Behind Connecting With Salesforce
The Integrations Behind Connecting With SalesforceThe Integrations Behind Connecting With Salesforce
The Integrations Behind Connecting With Salesforce
 
Mule ESB integration with Stripe
Mule ESB integration with StripeMule ESB integration with Stripe
Mule ESB integration with Stripe
 
Mule Salesforce Connector
Mule Salesforce ConnectorMule Salesforce Connector
Mule Salesforce Connector
 
Integration of linked in using mule esb
Integration of linked in using mule esbIntegration of linked in using mule esb
Integration of linked in using mule esb
 
Salesforce World Tour 2016 : Lightning Out : Components on any Platform
Salesforce World Tour 2016 : Lightning Out : Components on any PlatformSalesforce World Tour 2016 : Lightning Out : Components on any Platform
Salesforce World Tour 2016 : Lightning Out : Components on any Platform
 
Slack connector with in MULE
Slack connector with in MULESlack connector with in MULE
Slack connector with in MULE
 
Hop on the serverless adventure - International Javascript London
Hop on the serverless adventure - International Javascript LondonHop on the serverless adventure - International Javascript London
Hop on the serverless adventure - International Javascript London
 
Query in share point by mule
Query in share point by muleQuery in share point by mule
Query in share point by mule
 
Create object in amazon
Create object in amazonCreate object in amazon
Create object in amazon
 
Lighnting component development
Lighnting component developmentLighnting component development
Lighnting component development
 
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...
 

Similar to Centralisation of IAM (Identity and Access Management) 7 modern trends every it professional must know about (part 2/7)

How businesses can benefit by using Shared Ledger Technology.
How businesses can benefit by using Shared Ledger Technology.How businesses can benefit by using Shared Ledger Technology.
How businesses can benefit by using Shared Ledger Technology.Ibrahim Muhammadi
 
IRJET- Hampering the Cloning Attacks in Online Social Networks
IRJET-  	  Hampering the Cloning Attacks in Online Social NetworksIRJET-  	  Hampering the Cloning Attacks in Online Social Networks
IRJET- Hampering the Cloning Attacks in Online Social NetworksIRJET Journal
 
Nine key rules of Oracle Licensing
Nine key rules of Oracle LicensingNine key rules of Oracle Licensing
Nine key rules of Oracle LicensingKay Williams
 
Agile Gurugram 2016 | Conference | Why your Agile Project will fail? Softwar...
Agile Gurugram 2016 | Conference |  Why your Agile Project will fail? Softwar...Agile Gurugram 2016 | Conference |  Why your Agile Project will fail? Softwar...
Agile Gurugram 2016 | Conference | Why your Agile Project will fail? Softwar...AgileNetwork
 
How land developers can benefit from the bitcoin phenomena.
How land developers can benefit from the bitcoin phenomena.How land developers can benefit from the bitcoin phenomena.
How land developers can benefit from the bitcoin phenomena.Ibrahim Muhammadi
 
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...Microsoft Private Cloud
 
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"Ibrahim Muhammadi
 
IRJET- Tour and Travels
IRJET- Tour and TravelsIRJET- Tour and Travels
IRJET- Tour and TravelsIRJET Journal
 
Oracle licensing rules the 5 fatal mistakes
Oracle licensing rules   the 5 fatal mistakesOracle licensing rules   the 5 fatal mistakes
Oracle licensing rules the 5 fatal mistakesKay Williams
 
Web Hosting Control Panels
Web Hosting Control PanelsWeb Hosting Control Panels
Web Hosting Control PanelsPickaweb
 
De invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschapDe invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschapFrank Breedijk
 
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...WSO2
 
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...Yenlo
 
OAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedOAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedCalvin Noronha
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...Peter Selch Dahl
 
Maximising the opportunities of the online marketplace (South Australia)
Maximising the opportunities of the online marketplace (South Australia)Maximising the opportunities of the online marketplace (South Australia)
Maximising the opportunities of the online marketplace (South Australia)Zumio
 
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...WSO2
 
An Emerging Architecture Pattern for Agile Integration: Cell-based Architecture
An Emerging Architecture Pattern for Agile Integration: Cell-based ArchitectureAn Emerging Architecture Pattern for Agile Integration: Cell-based Architecture
An Emerging Architecture Pattern for Agile Integration: Cell-based ArchitectureAll Things Open
 
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...Asanka Abeysinghe
 

Similar to Centralisation of IAM (Identity and Access Management) 7 modern trends every it professional must know about (part 2/7) (20)

How businesses can benefit by using Shared Ledger Technology.
How businesses can benefit by using Shared Ledger Technology.How businesses can benefit by using Shared Ledger Technology.
How businesses can benefit by using Shared Ledger Technology.
 
IRJET- Hampering the Cloning Attacks in Online Social Networks
IRJET-  	  Hampering the Cloning Attacks in Online Social NetworksIRJET-  	  Hampering the Cloning Attacks in Online Social Networks
IRJET- Hampering the Cloning Attacks in Online Social Networks
 
Nine key rules of Oracle Licensing
Nine key rules of Oracle LicensingNine key rules of Oracle Licensing
Nine key rules of Oracle Licensing
 
Agile Gurugram 2016 | Conference | Why your Agile Project will fail? Softwar...
Agile Gurugram 2016 | Conference |  Why your Agile Project will fail? Softwar...Agile Gurugram 2016 | Conference |  Why your Agile Project will fail? Softwar...
Agile Gurugram 2016 | Conference | Why your Agile Project will fail? Softwar...
 
How land developers can benefit from the bitcoin phenomena.
How land developers can benefit from the bitcoin phenomena.How land developers can benefit from the bitcoin phenomena.
How land developers can benefit from the bitcoin phenomena.
 
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
 
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"
 
IRJET- Tour and Travels
IRJET- Tour and TravelsIRJET- Tour and Travels
IRJET- Tour and Travels
 
Oracle licensing rules the 5 fatal mistakes
Oracle licensing rules   the 5 fatal mistakesOracle licensing rules   the 5 fatal mistakes
Oracle licensing rules the 5 fatal mistakes
 
Web Hosting Control Panels
Web Hosting Control PanelsWeb Hosting Control Panels
Web Hosting Control Panels
 
De invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschapDe invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschap
 
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...
 
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
 
OAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedOAuth with Salesforce - Demystified
OAuth with Salesforce - Demystified
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
 
Maximising the opportunities of the online marketplace (South Australia)
Maximising the opportunities of the online marketplace (South Australia)Maximising the opportunities of the online marketplace (South Australia)
Maximising the opportunities of the online marketplace (South Australia)
 
Kenaz project
Kenaz projectKenaz project
Kenaz project
 
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...
 
An Emerging Architecture Pattern for Agile Integration: Cell-based Architecture
An Emerging Architecture Pattern for Agile Integration: Cell-based ArchitectureAn Emerging Architecture Pattern for Agile Integration: Cell-based Architecture
An Emerging Architecture Pattern for Agile Integration: Cell-based Architecture
 
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Centralisation of IAM (Identity and Access Management) 7 modern trends every it professional must know about (part 2/7)

  • 1. 7 modern trends every IT professional must know about (Part 2/7) cc: slworking2 - https://www.flickr.com/photos/18548283@N00
  • 2. Centralisation of IAM (Identity and Access Management) cc: Thomas Hawk - https://www.flickr.com/photos/51035555243@N01
  • 3. Most applications need some authentication system to identify users and manage access to different parts of the app cc: perspec_photo88 - https://www.flickr.com/photos/111692634@N04
  • 4. This is called IAM (Identity and Access Management) cc: Sarah M Stewart - https://www.flickr.com/photos/92632631@N00
  • 5. If the user is an enterprise employee it is done via Employee IAM and for public facing resources used by customers it is done via the Customer IAM cc: aaronvandorn - https://www.flickr.com/photos/94197248@N02
  • 6. Most applications need IAM and hence changes in IAM will affect most application developers.cc: rmlowe - https://www.flickr.com/photos/8143486@N04
  • 7. IAM is handled traditionally by application developers themselves - mostly by sticking a password form at the gateway of the application - Challenging users to prove their identity. cc: Bruno Santos - https://www.flickr.com/photos/65062705@N00
  • 8. That has resulted in fragmented IAM with every application storing user passwords and implementing their own security policies. cc: the justified sinner - https://www.flickr.com/photos/54799099@N00
  • 9. From the developer perspective IAM was a necessary evil - the application was their focus of course and not the IAM. cc: kirainet - https://www.flickr.com/photos/69078600@N00
  • 10. Most developers just stored passwords in a database and checked against that database at login time issuing tokens, cookies or session ids to the client for further identification and access management. cc: jeff_golden - https://www.flickr.com/photos/46868900@N00
  • 11. This had an adverse impact on security esp. since users used the same passwords on multiple sites and security breaches and stolen passwords on one system affected many others. cc: Visual Content - https://www.flickr.com/photos/143601516@N03
  • 12. This fragmentation of IAM, lack of focus on security and lack of focus on user experience in the authentication process was problematic. But that is changing now. cc: basykes - https://www.flickr.com/photos/11399912@N00
  • 13. IAM is getting centralised - with standards like "OpenID Connect" on top of “Oauth 2.0" protocol that provide the flow needed for "OpenID Connect" cc: Jim Nix / Nomadic Pursuits - https://www.flickr.com/photos/34825346@N02
  • 14. For application developers this means that they no longer have to worry about authenticating users or handling IAM. It can now be delegated to Identity providers.cc: sk8geek - https://www.flickr.com/photos/26170836@N05
  • 15. This centralisation of the IAM means that application developers do not have to do policy making for security and no more login forms of course. cc: AJ Batac - https://www.flickr.com/photos/89309115@N00
  • 16. The best part is perhaps - No more need to store passwords by developers of individual applications. cc: The Daring Librarian - https://www.flickr.com/photos/43666171@N07
  • 17. This also means that users are more in control of their identity and can grant or revoke permissions given to any application - all from one place. cc: sp3ccylad - https://www.flickr.com/photos/46978810@N00
  • 18. The user experience is now centralised into the hands of ID providers whose focus is on security, UX and the IAM process. Centralisation will lead to better UX and better security. cc: Daniel Kulinski - https://www.flickr.com/photos/7729940@N06
  • 19. Application developers can use the flows provided by Oauth 2.0 to obtain ID tokens and use these signed ID Tokens to identify the user throughout the app. cc: vintagedept - https://www.flickr.com/photos/42826854@N00
  • 20. Since ID providers specialise in IAM, they can evolve over a period and can integrate with biometric systems and other password-less systems to make the auth process better.cc: hawaii - https://www.flickr.com/photos/35034363370@N01
  • 21. These improvements will automatically be shared by all applications that use that IDp because of centralisation. cc: ryancr - https://www.flickr.com/photos/33128961@N00
  • 22. Also all security and other policies can now be controlled from one place. Which apps should be used by which users can be controlled at one single point by "Single Sign on (SSO)” cc: andrechinn - https://www.flickr.com/photos/16167252@N00
  • 23. The proliferation of cloud apps and also mobile apps has led to this major paradigm shift in IAM and has been facilitated by OAuth 2.0 protocol and OpenID Connect.cc: Matthew Burpee - https://www.flickr.com/photos/76323119@N00
  • 24. Next part of 7 modern trends every IT professional must know about cc: yourbartender - https://www.flickr.com/photos/10164012@N00