SlideShare a Scribd company logo
1 of 23
Presented by
Venkatesh Jambulingam
Cloud Security Expert
22-Jan-2022
Identity Management
| 22-Jan-2022 | Venkatesh Jambulingam |
▶Identity & Access Management Overview
▶Identity Management
– Types of Identities
– Identity Lifecycle / JML
– Provisioning/De-Provisioning
– Identity Mapping & Orphan accounts
▶Self Service
– Password reset
– Access Request
– Name / Profile Change
▶Consumer Identity & Access Management
2
Contents
IAM Overview
| 22-Jan-2022 | Venkatesh Jambulingam | 4
Identity & Access Management Overview
Ensuring right entities have right access to right resources at the right time for right reasons and hence protect the
confidentiality of the data
Identity
Management
Access
Management
Identity
Governance
Privileged Access
Management
| 22-Jan-2022 | Venkatesh Jambulingam | 5
Identity & Access Management Components
Self Service
Access Request
Management
Self Service
Password
Management
Policy, Role &
Attribute based
Access Control
Application
Onboarding &
Integration
Automated &
On-Demand
Provisioning
Identity Management
Automated
Lifecycle
Management
Role
Management
Access
Review
Segregation of
Duties
Identity Governance
Identity Analytics
& Insights
Compliance Controls
& Certification
Cloud & Data Access
Governance
Authentication
Multi-Factor
Authentication
Single Sign on Password less
Access Management
Authorization
Federation
Password
Vault
Session
Manager
Access
Manager
Compliance
Control
Privileged Access Management
Password
manager
Privileged Threat
Analytics
Identity Management
| 22-Jan-2022 | Venkatesh Jambulingam | 7
Type of Identities
B2B Identities B2C Identities
Consumer
Servers & Network Devices
APIs/Services Smart Watch
Managed in IAM system Managed in CIAM system
Employees & Contractors
Programs & Applications
Desktops, Laptops,
Printers, Scanners
Connected Car
AR/VR/MR Headsets
| 22-Jan-2022 | Venkatesh Jambulingam | 8
Identity Lifecyle
Create New
Identity
Create Accounts
Provision Access
& Birth Right
Access
Maintain Profile
& Manage
Access
De-Provision
Access
New identity is created in authoritative source
system (HR, CRM, AD, Asset Inventory) based
on physical word identity (Driving License,
Passport, Serial Number of device etc.,)
For human identities, AD/LDAP
account & mailbox is created.
For non-human identities, service
accounts are created in AD/LDAP
Multiple apps could be given
access by default based on role or
attributes. This is called birth right
access. Additional access is
granted based on request
Email & Phone number change
Promotion & location change
Department & Project Change
Legal Entity Change
Maintain access levels for each
of these changes.
User account is deactivated
immediately if user is terminated
User account is deactivated on
midnight of LWD+1 if user
resigned/retired
| 22-Jan-2022 | Venkatesh Jambulingam | 9
Identity Lifecycle - Joiner
New person identity
Govt issued identity provided by
the person to the organization
e.g. Driving License, Passport
Organization
Application identity or device
identity is created based in
CMDB/Asset Inventory
New non-person identity
Device Serial Number, Make, Model
or Application identifiers are shared
with Organization
User identity is created in
HRMS by the HR team based on
physical govt issued ID card
HR (Employee ID)
AD (Login ID)
Mailbox (Email ID)
Payroll (Employee ID)
Collaboration (Email ID)
Digital Certificate
Service account in AD
Digital certificates
Provisioning system creates
the necessary accounts
needed for given identity
Identity
| 22-Jan-2022 | Venkatesh Jambulingam | 10
Identity Lifecycle - Mover
Person identity
User Changes project, location
or gets promoted
Moves/Changes
for identity
Allocation details of device /
application is captured in
CMDB/Asset Inventory
Non-person identity
Device is allocated/moved for
specific use in a specific environment
HR team updates the location,
designation, or project details
in HRMS
Profile details updated in other
downstream systems
Old permissions are revoked
New permissions are added
Network / other Access
permission granted
Provisioning system updates the
necessary permission/access for
given identity
Identity
| 22-Jan-2022 | Venkatesh Jambulingam | 11
Identity Lifecycle - Leaver
Person identity
User Retires or User is Fired
Retire / Fire /
Decommission
Allocation details of device /
application is updated as
decommissioned in
CMDB/Asset Inventory
Non-person identity
Device is decommissioned as not fit
for use
HR team updates the person’s
employment status in HRMS as
retired or fired with along with
last working day
User identity is deactivated on
LWD +1 midnight in AD
In case of firing, it is deactivated
immediately
All access permissions are
revoked
Identity of the application /
device is deactivated
Provisioning system updates the
necessary permission/access for
given identity
Identity
| 22-Jan-2022 | Venkatesh Jambulingam |
▶Provisioning is a process that involves creation of user accounts, assigning & managing roles and permissions for these accounts in
various target resources like applications, systems and networks performed in an automated or semi-automated way
▶Provisioning application will read user information from identity system, read application roles from application onboarding
information and will create a role mapping based on the organization policies
▶Role mapping information can be sent to the target application based on the provisioning configuration type.
▶Authorization information can be sent by the provisioning application or local authorization can be done by the application based
on role mapping data sent by provision application
12
Provisioning
User1 User2
Role #1:
App Owner
Role #2:
Manager
Authoritative
Identity System
Provisioning app Application Roles, Permissions
Application #1
Database
User 2
Role Mapped Database
for each provisioning
target application
Identity
Token/Roles
User 4 User 5
Group 1
User 4 User 5
Group 1
User3
Role Mapping based
on organization policy
Role #3:
Analyst
| 22-Jan-2022 | Venkatesh Jambulingam |
▶Discretionary access provisioning
–Often used in small to mid-sized companies, this approach allows a network administrator to decide which applications and
data end users can access.
▶Self-service access provisioning
–Typically, this approach is used to help reduce an administrator’s workload. It enables users to participate in some aspects of
the provisioning process such as requesting an account and self-managing passwords.
▶Workflow-based account provisioning
– Approvals from designated approvers are required before granting user access to an application or data. For example, access
to finances would require approval from the company’s chief financial officer.
▶Automated account provisioning
–With this method, every account is added in the same manner through a centralized management application interface
–This streamlines the process of adding and managing user credentials and provides administrators with the most accurate way
to track who has access to specific applications and data sources
–Although provisioning and identity management processes are the same, the extent and type of provisioning varies greatly
among different users (e.g. patients, clinicians, customers, and partners)
13
Provisioning Types
| 22-Jan-2022 | Venkatesh Jambulingam |
▶Identity mapping is an activity that links various accounts across applications in different formats to single authoritative identity in
HRMS or active directory
▶Orphan accounts are identities in the applications that do not point to any authoritative identity
▶Orphan accounts represent two kinds of security risk:
–If the account actually has no owner, or the owner has left, they represent an elevated risk of misuse, since any unusual use
of the account will not be detected by the account's (absent) owner.
–Orphan accounts cannot be reliably deactivated when their owner leaves, because of the missing linkage to that owner.
14
Identity Mapping & Orphan Accounts
Data Integration
Tools
Rules and
Stored
Procedures
Performed using
IDM/IGA tools or
even without them
Orphan
Accounts
HR (Employee ID)
Authoritative Source
Identity
Map
HCM
AD (Login ID)
Mailbox (Email ID)
Payroll (Employee ID)
Collaboration (Email ID)
AD
E.g., SSIS or ODI
Self Service
| 22-Jan-2022 | Venkatesh Jambulingam |
▶ Self-service password reset is defined as any process or technology that allows users who have either forgotten their password
or triggered an intruder lockout to authenticate with an alternate method and repair their own problem, without calling the help
desk
▶ Self-service password reset solutions perform the reset and unlock functions by directly interacting with the user directory,
typically this is Active Directory
16
Self Service Password Management
User account
Gets locked/Password
Reset
Self service portal
challenges the users with
security questions and asks
for additional details to
verify the identity
User opens into self service
portal and requests password
reset or account unlock
Password Reset / Account Unlocked
in AD / IDP by self service portal
and user is notified
User provides
the correct
response
| 22-Jan-2022 | Venkatesh Jambulingam |
▶ Workflow Automation refers to the design, execution, and automation of processes based on workflow rules where human
tasks, data or files are routed between people or systems based on pre-defined business rules.
▶ Workflow allows business users and automated processes to request and authorize access changes.
▶ The changes are executed across the network according to predefined IAM rule sets.
17
Self Service Access Request Management
User raises a request in
self service portal for new
access /change in access
Approver(s) review
requests based on
needed approval levels
Notify user and update the ticket
status in the self service portal
Request forwarded to IAM team or the
automated provisioning system picks up
the approved ticket for processing
User assigned the new access or change
in access done as per request
Approved
| 22-Jan-2022 | Venkatesh Jambulingam |
▶ Self-service profile change is a process or technology that allows users to modify their name and other profile details like phone
number, address and photo without a need for calling the help desk or support team
18
Self Service Profile Change
User wants to change their
profile information like phone
number, address, photo
In case of name change,
employee uploads govt issued id
or marriage certificate
Updated information is replicated
across other downstream
systems automatically
User logs into and makes the
changes in the HR system or other
authoritative system
In case of name change, human
resources team will verify the
physical id / marriage certificate
and approve the name change
Downstream systems displays the
updated information
Consumer Identity &
Access Management
| 22-Jan-2022 | Venkatesh Jambulingam |
▶ Customer identity and access management is a special type of IAM
system that enables organizations to securely capture and manage end
consumer or customer identity and profile data, and control customer
access to applications and services in a B2C environment.
▶ CIAM solutions ensure a secure, seamless customer experience at
extreme scale and performance, no matter which channels (web, mobile,
etc.) customers use to engage with an organization brand.
20
Consumer Identity & Access Management (CIAM)
CIAM
Features
Social
Registration
Self Service
Account
Management
SSO/MFA
& Access
Management
Consent
Management
Customer
Registration
Registration Authentication Self Service Support
Self Service Support Personalization
Security &
Privacy
Customer Onboarding & Engagement
Brand Loyalty & Customer Experience
Customer Trust
| 22-Jan-2022 | Venkatesh Jambulingam | 21
IAM vs CIAM
▶ CIAM solutions are designed to support millions of
customers or consumers of an organization
▶ CIAM solutions are built to handle rapid spikes in traffic
volume and frequency.
▶ Built for B2C setup
▶ Consumers can have multiple identities
▶ Identities are self-registered & manged by customers
themselves
▶ Provides with a consistent login experience no matter
where the end-user is or what device they’re using.
▶ Supports Social Authentication
▶ Enables Consent Management
▶ Allows organizations to create personalized user
experience
▶ IAM solutions are designed to handle thousands of
identities in a given organization
▶ Traditional IAM solutions have less capability to handle
sudden spikes in authentication & authorization traffic
▶ Suitable for B2B setup
▶ Single identity per user
▶ Identities are created by on organization for their
employees or contractors
▶ Primarily used for authentication & authorization with strict
security policies for corporate and business applications
IAM CIAM
Thank you
Creative
Commons
By Non
Commercial
Share
Alike
This document is shared under
CC BY-NC-SA 4.0 license
| 22-Jan-2022 | Venkatesh Jambulingam | 23
About me
Venkatesh Jambulingam
Cloud Security Expert
Email:
cybervattam@gmail.com
cybervattam@outlook.com
Follow me on

More Related Content

What's hot

Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceArijan Horvat
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 

What's hot (20)

Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 

Similar to Identity Management

Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
E trading platform for insurance
E trading platform for insurance E trading platform for insurance
E trading platform for insurance supriyo12
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM csandit
 
Iam update 2014.10.16
Iam update   2014.10.16Iam update   2014.10.16
Iam update 2014.10.16kevin_donovan
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java projectTutorial Learners
 
dbms report roll no 53 (1).pptx
dbms report roll no 53 (1).pptxdbms report roll no 53 (1).pptx
dbms report roll no 53 (1).pptxNividitaDarwai
 
IRJET - College Event Recommendation System using LOG based Count Method
IRJET - College Event Recommendation System using LOG based Count MethodIRJET - College Event Recommendation System using LOG based Count Method
IRJET - College Event Recommendation System using LOG based Count MethodIRJET Journal
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)Gord Reynolds
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprisehardik soni
 
Security operation-center
Security operation-centerSecurity operation-center
Security operation-centerbharti singhal
 
Security operation-center
Security operation-centerSecurity operation-center
Security operation-centerbharti singhal
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessForgeRock
 
SMART ASSIST SERVICE AT YOUR DOOR STEPS
SMART ASSIST SERVICE AT YOUR DOOR STEPSSMART ASSIST SERVICE AT YOUR DOOR STEPS
SMART ASSIST SERVICE AT YOUR DOOR STEPSIRJET Journal
 
White paperdynamichealthcare
White paperdynamichealthcareWhite paperdynamichealthcare
White paperdynamichealthcareTheresaMconte
 

Similar to Identity Management (20)

Co p
Co pCo p
Co p
 
Co p
Co pCo p
Co p
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networks
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
E trading platform for insurance
E trading platform for insurance E trading platform for insurance
E trading platform for insurance
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
Iam update 2014.10.16
Iam update   2014.10.16Iam update   2014.10.16
Iam update 2014.10.16
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java project
 
unit4.pptx
unit4.pptxunit4.pptx
unit4.pptx
 
AbedElilahElmahmoumP1.pptx
AbedElilahElmahmoumP1.pptxAbedElilahElmahmoumP1.pptx
AbedElilahElmahmoumP1.pptx
 
dbms report roll no 53 (1).pptx
dbms report roll no 53 (1).pptxdbms report roll no 53 (1).pptx
dbms report roll no 53 (1).pptx
 
IRJET - College Event Recommendation System using LOG based Count Method
IRJET - College Event Recommendation System using LOG based Count MethodIRJET - College Event Recommendation System using LOG based Count Method
IRJET - College Event Recommendation System using LOG based Count Method
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 
Security operation-center
Security operation-centerSecurity operation-center
Security operation-center
 
Security operation-center
Security operation-centerSecurity operation-center
Security operation-center
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
SMART ASSIST SERVICE AT YOUR DOOR STEPS
SMART ASSIST SERVICE AT YOUR DOOR STEPSSMART ASSIST SERVICE AT YOUR DOOR STEPS
SMART ASSIST SERVICE AT YOUR DOOR STEPS
 
White paperdynamichealthcare
White paperdynamichealthcareWhite paperdynamichealthcare
White paperdynamichealthcare
 

More from Venkatesh Jambulingam

அடையாள மேலாண்மை | Identity Management in Tamil
அடையாள மேலாண்மை | Identity Management in Tamilஅடையாள மேலாண்மை | Identity Management in Tamil
அடையாள மேலாண்மை | Identity Management in TamilVenkatesh Jambulingam
 
அணுகல் மேலாண்மை | Access Management
அணுகல் மேலாண்மை | Access Managementஅணுகல் மேலாண்மை | Access Management
அணுகல் மேலாண்மை | Access ManagementVenkatesh Jambulingam
 
மேகக்கணிமை | Cloud Computing
மேகக்கணிமை | Cloud Computingமேகக்கணிமை | Cloud Computing
மேகக்கணிமை | Cloud ComputingVenkatesh Jambulingam
 
பொதுத் திறவி உள்கட்டமைப்பு | Public Key Infrastructure in Tamil
பொதுத் திறவி உள்கட்டமைப்பு | Public Key Infrastructure in Tamilபொதுத் திறவி உள்கட்டமைப்பு | Public Key Infrastructure in Tamil
பொதுத் திறவி உள்கட்டமைப்பு | Public Key Infrastructure in TamilVenkatesh Jambulingam
 
களப்பெயர் முறைமை | Domain Name System (DNS)
களப்பெயர் முறைமை | Domain Name System (DNS)களப்பெயர் முறைமை | Domain Name System (DNS)
களப்பெயர் முறைமை | Domain Name System (DNS)Venkatesh Jambulingam
 
கட்டச்சங்கிலி | Blockchain in Tamil
கட்டச்சங்கிலி | Blockchain in Tamilகட்டச்சங்கிலி | Blockchain in Tamil
கட்டச்சங்கிலி | Blockchain in TamilVenkatesh Jambulingam
 
மறைப்பியல் | Cryptography in Tamil
மறைப்பியல் | Cryptography in Tamilமறைப்பியல் | Cryptography in Tamil
மறைப்பியல் | Cryptography in TamilVenkatesh Jambulingam
 

More from Venkatesh Jambulingam (13)

அடையாள மேலாண்மை | Identity Management in Tamil
அடையாள மேலாண்மை | Identity Management in Tamilஅடையாள மேலாண்மை | Identity Management in Tamil
அடையாள மேலாண்மை | Identity Management in Tamil
 
அணுகல் மேலாண்மை | Access Management
அணுகல் மேலாண்மை | Access Managementஅணுகல் மேலாண்மை | Access Management
அணுகல் மேலாண்மை | Access Management
 
Access management
Access managementAccess management
Access management
 
Cloud computing Introduction
Cloud computing IntroductionCloud computing Introduction
Cloud computing Introduction
 
மேகக்கணிமை | Cloud Computing
மேகக்கணிமை | Cloud Computingமேகக்கணிமை | Cloud Computing
மேகக்கணிமை | Cloud Computing
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
பொதுத் திறவி உள்கட்டமைப்பு | Public Key Infrastructure in Tamil
பொதுத் திறவி உள்கட்டமைப்பு | Public Key Infrastructure in Tamilபொதுத் திறவி உள்கட்டமைப்பு | Public Key Infrastructure in Tamil
பொதுத் திறவி உள்கட்டமைப்பு | Public Key Infrastructure in Tamil
 
Domain Name System (DNS)
Domain Name System (DNS)Domain Name System (DNS)
Domain Name System (DNS)
 
களப்பெயர் முறைமை | Domain Name System (DNS)
களப்பெயர் முறைமை | Domain Name System (DNS)களப்பெயர் முறைமை | Domain Name System (DNS)
களப்பெயர் முறைமை | Domain Name System (DNS)
 
Blockchain
BlockchainBlockchain
Blockchain
 
கட்டச்சங்கிலி | Blockchain in Tamil
கட்டச்சங்கிலி | Blockchain in Tamilகட்டச்சங்கிலி | Blockchain in Tamil
கட்டச்சங்கிலி | Blockchain in Tamil
 
Cryptography
CryptographyCryptography
Cryptography
 
மறைப்பியல் | Cryptography in Tamil
மறைப்பியல் | Cryptography in Tamilமறைப்பியல் | Cryptography in Tamil
மறைப்பியல் | Cryptography in Tamil
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Identity Management

  • 1. Presented by Venkatesh Jambulingam Cloud Security Expert 22-Jan-2022 Identity Management
  • 2. | 22-Jan-2022 | Venkatesh Jambulingam | ▶Identity & Access Management Overview ▶Identity Management – Types of Identities – Identity Lifecycle / JML – Provisioning/De-Provisioning – Identity Mapping & Orphan accounts ▶Self Service – Password reset – Access Request – Name / Profile Change ▶Consumer Identity & Access Management 2 Contents
  • 4. | 22-Jan-2022 | Venkatesh Jambulingam | 4 Identity & Access Management Overview Ensuring right entities have right access to right resources at the right time for right reasons and hence protect the confidentiality of the data Identity Management Access Management Identity Governance Privileged Access Management
  • 5. | 22-Jan-2022 | Venkatesh Jambulingam | 5 Identity & Access Management Components Self Service Access Request Management Self Service Password Management Policy, Role & Attribute based Access Control Application Onboarding & Integration Automated & On-Demand Provisioning Identity Management Automated Lifecycle Management Role Management Access Review Segregation of Duties Identity Governance Identity Analytics & Insights Compliance Controls & Certification Cloud & Data Access Governance Authentication Multi-Factor Authentication Single Sign on Password less Access Management Authorization Federation Password Vault Session Manager Access Manager Compliance Control Privileged Access Management Password manager Privileged Threat Analytics
  • 7. | 22-Jan-2022 | Venkatesh Jambulingam | 7 Type of Identities B2B Identities B2C Identities Consumer Servers & Network Devices APIs/Services Smart Watch Managed in IAM system Managed in CIAM system Employees & Contractors Programs & Applications Desktops, Laptops, Printers, Scanners Connected Car AR/VR/MR Headsets
  • 8. | 22-Jan-2022 | Venkatesh Jambulingam | 8 Identity Lifecyle Create New Identity Create Accounts Provision Access & Birth Right Access Maintain Profile & Manage Access De-Provision Access New identity is created in authoritative source system (HR, CRM, AD, Asset Inventory) based on physical word identity (Driving License, Passport, Serial Number of device etc.,) For human identities, AD/LDAP account & mailbox is created. For non-human identities, service accounts are created in AD/LDAP Multiple apps could be given access by default based on role or attributes. This is called birth right access. Additional access is granted based on request Email & Phone number change Promotion & location change Department & Project Change Legal Entity Change Maintain access levels for each of these changes. User account is deactivated immediately if user is terminated User account is deactivated on midnight of LWD+1 if user resigned/retired
  • 9. | 22-Jan-2022 | Venkatesh Jambulingam | 9 Identity Lifecycle - Joiner New person identity Govt issued identity provided by the person to the organization e.g. Driving License, Passport Organization Application identity or device identity is created based in CMDB/Asset Inventory New non-person identity Device Serial Number, Make, Model or Application identifiers are shared with Organization User identity is created in HRMS by the HR team based on physical govt issued ID card HR (Employee ID) AD (Login ID) Mailbox (Email ID) Payroll (Employee ID) Collaboration (Email ID) Digital Certificate Service account in AD Digital certificates Provisioning system creates the necessary accounts needed for given identity Identity
  • 10. | 22-Jan-2022 | Venkatesh Jambulingam | 10 Identity Lifecycle - Mover Person identity User Changes project, location or gets promoted Moves/Changes for identity Allocation details of device / application is captured in CMDB/Asset Inventory Non-person identity Device is allocated/moved for specific use in a specific environment HR team updates the location, designation, or project details in HRMS Profile details updated in other downstream systems Old permissions are revoked New permissions are added Network / other Access permission granted Provisioning system updates the necessary permission/access for given identity Identity
  • 11. | 22-Jan-2022 | Venkatesh Jambulingam | 11 Identity Lifecycle - Leaver Person identity User Retires or User is Fired Retire / Fire / Decommission Allocation details of device / application is updated as decommissioned in CMDB/Asset Inventory Non-person identity Device is decommissioned as not fit for use HR team updates the person’s employment status in HRMS as retired or fired with along with last working day User identity is deactivated on LWD +1 midnight in AD In case of firing, it is deactivated immediately All access permissions are revoked Identity of the application / device is deactivated Provisioning system updates the necessary permission/access for given identity Identity
  • 12. | 22-Jan-2022 | Venkatesh Jambulingam | ▶Provisioning is a process that involves creation of user accounts, assigning & managing roles and permissions for these accounts in various target resources like applications, systems and networks performed in an automated or semi-automated way ▶Provisioning application will read user information from identity system, read application roles from application onboarding information and will create a role mapping based on the organization policies ▶Role mapping information can be sent to the target application based on the provisioning configuration type. ▶Authorization information can be sent by the provisioning application or local authorization can be done by the application based on role mapping data sent by provision application 12 Provisioning User1 User2 Role #1: App Owner Role #2: Manager Authoritative Identity System Provisioning app Application Roles, Permissions Application #1 Database User 2 Role Mapped Database for each provisioning target application Identity Token/Roles User 4 User 5 Group 1 User 4 User 5 Group 1 User3 Role Mapping based on organization policy Role #3: Analyst
  • 13. | 22-Jan-2022 | Venkatesh Jambulingam | ▶Discretionary access provisioning –Often used in small to mid-sized companies, this approach allows a network administrator to decide which applications and data end users can access. ▶Self-service access provisioning –Typically, this approach is used to help reduce an administrator’s workload. It enables users to participate in some aspects of the provisioning process such as requesting an account and self-managing passwords. ▶Workflow-based account provisioning – Approvals from designated approvers are required before granting user access to an application or data. For example, access to finances would require approval from the company’s chief financial officer. ▶Automated account provisioning –With this method, every account is added in the same manner through a centralized management application interface –This streamlines the process of adding and managing user credentials and provides administrators with the most accurate way to track who has access to specific applications and data sources –Although provisioning and identity management processes are the same, the extent and type of provisioning varies greatly among different users (e.g. patients, clinicians, customers, and partners) 13 Provisioning Types
  • 14. | 22-Jan-2022 | Venkatesh Jambulingam | ▶Identity mapping is an activity that links various accounts across applications in different formats to single authoritative identity in HRMS or active directory ▶Orphan accounts are identities in the applications that do not point to any authoritative identity ▶Orphan accounts represent two kinds of security risk: –If the account actually has no owner, or the owner has left, they represent an elevated risk of misuse, since any unusual use of the account will not be detected by the account's (absent) owner. –Orphan accounts cannot be reliably deactivated when their owner leaves, because of the missing linkage to that owner. 14 Identity Mapping & Orphan Accounts Data Integration Tools Rules and Stored Procedures Performed using IDM/IGA tools or even without them Orphan Accounts HR (Employee ID) Authoritative Source Identity Map HCM AD (Login ID) Mailbox (Email ID) Payroll (Employee ID) Collaboration (Email ID) AD E.g., SSIS or ODI
  • 16. | 22-Jan-2022 | Venkatesh Jambulingam | ▶ Self-service password reset is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate method and repair their own problem, without calling the help desk ▶ Self-service password reset solutions perform the reset and unlock functions by directly interacting with the user directory, typically this is Active Directory 16 Self Service Password Management User account Gets locked/Password Reset Self service portal challenges the users with security questions and asks for additional details to verify the identity User opens into self service portal and requests password reset or account unlock Password Reset / Account Unlocked in AD / IDP by self service portal and user is notified User provides the correct response
  • 17. | 22-Jan-2022 | Venkatesh Jambulingam | ▶ Workflow Automation refers to the design, execution, and automation of processes based on workflow rules where human tasks, data or files are routed between people or systems based on pre-defined business rules. ▶ Workflow allows business users and automated processes to request and authorize access changes. ▶ The changes are executed across the network according to predefined IAM rule sets. 17 Self Service Access Request Management User raises a request in self service portal for new access /change in access Approver(s) review requests based on needed approval levels Notify user and update the ticket status in the self service portal Request forwarded to IAM team or the automated provisioning system picks up the approved ticket for processing User assigned the new access or change in access done as per request Approved
  • 18. | 22-Jan-2022 | Venkatesh Jambulingam | ▶ Self-service profile change is a process or technology that allows users to modify their name and other profile details like phone number, address and photo without a need for calling the help desk or support team 18 Self Service Profile Change User wants to change their profile information like phone number, address, photo In case of name change, employee uploads govt issued id or marriage certificate Updated information is replicated across other downstream systems automatically User logs into and makes the changes in the HR system or other authoritative system In case of name change, human resources team will verify the physical id / marriage certificate and approve the name change Downstream systems displays the updated information
  • 20. | 22-Jan-2022 | Venkatesh Jambulingam | ▶ Customer identity and access management is a special type of IAM system that enables organizations to securely capture and manage end consumer or customer identity and profile data, and control customer access to applications and services in a B2C environment. ▶ CIAM solutions ensure a secure, seamless customer experience at extreme scale and performance, no matter which channels (web, mobile, etc.) customers use to engage with an organization brand. 20 Consumer Identity & Access Management (CIAM) CIAM Features Social Registration Self Service Account Management SSO/MFA & Access Management Consent Management Customer Registration Registration Authentication Self Service Support Self Service Support Personalization Security & Privacy Customer Onboarding & Engagement Brand Loyalty & Customer Experience Customer Trust
  • 21. | 22-Jan-2022 | Venkatesh Jambulingam | 21 IAM vs CIAM ▶ CIAM solutions are designed to support millions of customers or consumers of an organization ▶ CIAM solutions are built to handle rapid spikes in traffic volume and frequency. ▶ Built for B2C setup ▶ Consumers can have multiple identities ▶ Identities are self-registered & manged by customers themselves ▶ Provides with a consistent login experience no matter where the end-user is or what device they’re using. ▶ Supports Social Authentication ▶ Enables Consent Management ▶ Allows organizations to create personalized user experience ▶ IAM solutions are designed to handle thousands of identities in a given organization ▶ Traditional IAM solutions have less capability to handle sudden spikes in authentication & authorization traffic ▶ Suitable for B2B setup ▶ Single identity per user ▶ Identities are created by on organization for their employees or contractors ▶ Primarily used for authentication & authorization with strict security policies for corporate and business applications IAM CIAM
  • 22. Thank you Creative Commons By Non Commercial Share Alike This document is shared under CC BY-NC-SA 4.0 license
  • 23. | 22-Jan-2022 | Venkatesh Jambulingam | 23 About me Venkatesh Jambulingam Cloud Security Expert Email: cybervattam@gmail.com cybervattam@outlook.com Follow me on