SlideShare a Scribd company logo
7 modern trends every IT professional
must know about (Part 2/7)
cc: slworking2 - https://www.flickr.com/photos/18548283@N00
Centralisation of IAM (Identity and Access Management)
cc: Thomas Hawk - https://www.flickr.com/photos/51035555243@N01
Most applications need some authentication system to
identify users and manage access to different parts of
the app
cc: perspec_photo88 - https://www.flickr.com/photos/111692634@N04
This is called IAM (Identity and
Access Management)
cc: Sarah M Stewart - https://www.flickr.com/photos/92632631@N00
If the user is an enterprise employee it is done via
Employee IAM and for public facing resources used by
customers it is done via the Customer IAM
cc: aaronvandorn - https://www.flickr.com/photos/94197248@N02
Most applications need IAM and hence
changes in IAM will affect most
application developers.cc: rmlowe - https://www.flickr.com/photos/8143486@N04
IAM is handled traditionally by application developers
themselves - mostly by sticking a password form at the
gateway of the application - Challenging users to prove their
identity.
cc: Bruno Santos - https://www.flickr.com/photos/65062705@N00
That has resulted in fragmented IAM with every
application storing user passwords and implementing
their own security policies.
cc: the justified sinner - https://www.flickr.com/photos/54799099@N00
From the developer perspective IAM was a
necessary evil - the application was their focus of
course and not the IAM.
cc: kirainet - https://www.flickr.com/photos/69078600@N00
Most developers just stored passwords in a database and checked
against that database at login time issuing tokens, cookies or
session ids to the client for further identification and access
management.
cc: jeff_golden - https://www.flickr.com/photos/46868900@N00
This had an adverse impact on security esp. since users used
the same passwords on multiple sites and security breaches
and stolen passwords on one system affected many others.
cc: Visual Content - https://www.flickr.com/photos/143601516@N03
This fragmentation of IAM, lack of focus on security
and lack of focus on user experience in the
authentication process was problematic. But that is
changing now.
cc: basykes - https://www.flickr.com/photos/11399912@N00
IAM is getting centralised - with standards like
"OpenID Connect" on top of “Oauth 2.0" protocol that
provide the flow needed for "OpenID Connect"
cc: Jim Nix / Nomadic Pursuits - https://www.flickr.com/photos/34825346@N02
For application developers this means that they no
longer have to worry about authenticating users or
handling IAM. It can now be delegated to Identity
providers.cc: sk8geek - https://www.flickr.com/photos/26170836@N05
This centralisation of the IAM means that application
developers do not have to do policy making for
security and no more login forms of course.
cc: AJ Batac - https://www.flickr.com/photos/89309115@N00
The best part is perhaps - No more need to
store passwords by developers of individual
applications.
cc: The Daring Librarian - https://www.flickr.com/photos/43666171@N07
This also means that users are more in control of their
identity and can grant or revoke permissions given to
any application - all from one place.
cc: sp3ccylad - https://www.flickr.com/photos/46978810@N00
The user experience is now centralised into the hands of ID
providers whose focus is on security, UX and the IAM
process. Centralisation will lead to better UX and better
security.
cc: Daniel Kulinski - https://www.flickr.com/photos/7729940@N06
Application developers can use the flows provided by
Oauth 2.0 to obtain ID tokens and use these signed ID
Tokens to identify the user throughout the app.
cc: vintagedept - https://www.flickr.com/photos/42826854@N00
Since ID providers specialise in IAM, they can evolve
over a period and can integrate with biometric systems
and other password-less systems to make the auth
process better.cc: hawaii - https://www.flickr.com/photos/35034363370@N01
These improvements will automatically be
shared by all applications that use that IDp
because of centralisation.
cc: ryancr - https://www.flickr.com/photos/33128961@N00
Also all security and other policies can now be controlled
from one place. Which apps should be used by which users
can be controlled at one single point by "Single Sign on
(SSO)”
cc: andrechinn - https://www.flickr.com/photos/16167252@N00
The proliferation of cloud apps and also mobile apps
has led to this major paradigm shift in IAM and has
been facilitated by OAuth 2.0 protocol and OpenID
Connect.cc: Matthew Burpee - https://www.flickr.com/photos/76323119@N00
Next part of 7 modern trends every IT
professional must know about
cc: yourbartender - https://www.flickr.com/photos/10164012@N00

More Related Content

What's hot

Magnify your user experience with lightning flow
Magnify your user experience with lightning flowMagnify your user experience with lightning flow
Magnify your user experience with lightning flow
Nitesh Singh
 
The Integrations Behind Connecting With Salesforce
The Integrations Behind Connecting With SalesforceThe Integrations Behind Connecting With Salesforce
The Integrations Behind Connecting With Salesforce
AaronLieberman5
 
Mule ESB integration with Stripe
Mule ESB integration with StripeMule ESB integration with Stripe
Mule ESB integration with Stripe
Ramakrishna Narkedamilli
 
Mule Salesforce Connector
Mule Salesforce ConnectorMule Salesforce Connector
Mule Salesforce Connector
Ankush Sharma
 
Integration of linked in using mule esb
Integration of linked in using mule esbIntegration of linked in using mule esb
Integration of linked in using mule esb
Sanjeet Pandey
 
Salesforce World Tour 2016 : Lightning Out : Components on any Platform
Salesforce World Tour 2016 : Lightning Out : Components on any PlatformSalesforce World Tour 2016 : Lightning Out : Components on any Platform
Salesforce World Tour 2016 : Lightning Out : Components on any Platform
andyinthecloud
 
Slack connector with in MULE
Slack connector with in MULESlack connector with in MULE
Slack connector with in MULE
D.Rajesh Kumar
 
Hop on the serverless adventure - International Javascript London
Hop on the serverless adventure - International Javascript LondonHop on the serverless adventure - International Javascript London
Hop on the serverless adventure - International Javascript London
Simona Cotin
 
Query in share point by mule
Query in share point by muleQuery in share point by mule
Query in share point by mule
Son Nguyen
 
Create object in amazon
Create object in amazonCreate object in amazon
Create object in amazon
Son Nguyen
 
Lighnting component development
Lighnting component developmentLighnting component development
Lighnting component development
Mohith Shrivastava
 
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...
Amit Singh
 

What's hot (12)

Magnify your user experience with lightning flow
Magnify your user experience with lightning flowMagnify your user experience with lightning flow
Magnify your user experience with lightning flow
 
The Integrations Behind Connecting With Salesforce
The Integrations Behind Connecting With SalesforceThe Integrations Behind Connecting With Salesforce
The Integrations Behind Connecting With Salesforce
 
Mule ESB integration with Stripe
Mule ESB integration with StripeMule ESB integration with Stripe
Mule ESB integration with Stripe
 
Mule Salesforce Connector
Mule Salesforce ConnectorMule Salesforce Connector
Mule Salesforce Connector
 
Integration of linked in using mule esb
Integration of linked in using mule esbIntegration of linked in using mule esb
Integration of linked in using mule esb
 
Salesforce World Tour 2016 : Lightning Out : Components on any Platform
Salesforce World Tour 2016 : Lightning Out : Components on any PlatformSalesforce World Tour 2016 : Lightning Out : Components on any Platform
Salesforce World Tour 2016 : Lightning Out : Components on any Platform
 
Slack connector with in MULE
Slack connector with in MULESlack connector with in MULE
Slack connector with in MULE
 
Hop on the serverless adventure - International Javascript London
Hop on the serverless adventure - International Javascript LondonHop on the serverless adventure - International Javascript London
Hop on the serverless adventure - International Javascript London
 
Query in share point by mule
Query in share point by muleQuery in share point by mule
Query in share point by mule
 
Create object in amazon
Create object in amazonCreate object in amazon
Create object in amazon
 
Lighnting component development
Lighnting component developmentLighnting component development
Lighnting component development
 
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...
Rollup Summary Trigger for Lookup Relationship Salesforce #Salesforce #ApexTr...
 

Similar to Centralisation of IAM (Identity and Access Management) 7 modern trends every it professional must know about (part 2/7)

How businesses can benefit by using Shared Ledger Technology.
How businesses can benefit by using Shared Ledger Technology.How businesses can benefit by using Shared Ledger Technology.
How businesses can benefit by using Shared Ledger Technology.
Ibrahim Muhammadi
 
IRJET- Hampering the Cloning Attacks in Online Social Networks
IRJET-  	  Hampering the Cloning Attacks in Online Social NetworksIRJET-  	  Hampering the Cloning Attacks in Online Social Networks
IRJET- Hampering the Cloning Attacks in Online Social Networks
IRJET Journal
 
Nine key rules of Oracle Licensing
Nine key rules of Oracle LicensingNine key rules of Oracle Licensing
Nine key rules of Oracle Licensing
Kay Williams
 
Agile Gurugram 2016 | Conference | Why your Agile Project will fail? Softwar...
Agile Gurugram 2016 | Conference |  Why your Agile Project will fail? Softwar...Agile Gurugram 2016 | Conference |  Why your Agile Project will fail? Softwar...
Agile Gurugram 2016 | Conference | Why your Agile Project will fail? Softwar...
AgileNetwork
 
How land developers can benefit from the bitcoin phenomena.
How land developers can benefit from the bitcoin phenomena.How land developers can benefit from the bitcoin phenomena.
How land developers can benefit from the bitcoin phenomena.
Ibrahim Muhammadi
 
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
Microsoft Private Cloud
 
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"
Ibrahim Muhammadi
 
IRJET- Tour and Travels
IRJET- Tour and TravelsIRJET- Tour and Travels
IRJET- Tour and Travels
IRJET Journal
 
Oracle licensing rules the 5 fatal mistakes
Oracle licensing rules   the 5 fatal mistakesOracle licensing rules   the 5 fatal mistakes
Oracle licensing rules the 5 fatal mistakes
Kay Williams
 
Web Hosting Control Panels
Web Hosting Control PanelsWeb Hosting Control Panels
Web Hosting Control Panels
Pickaweb
 
De invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschapDe invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschap
Frank Breedijk
 
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
Yenlo
 
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...
WSO2
 
OAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedOAuth with Salesforce - Demystified
OAuth with Salesforce - Demystified
Calvin Noronha
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
Peter Selch Dahl
 
Maximising the opportunities of the online marketplace (South Australia)
Maximising the opportunities of the online marketplace (South Australia)Maximising the opportunities of the online marketplace (South Australia)
Maximising the opportunities of the online marketplace (South Australia)
Zumio
 
Kenaz project
Kenaz projectKenaz project
Kenaz project
Martin Kiuru
 
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...
WSO2
 
An Emerging Architecture Pattern for Agile Integration: Cell-based Architecture
An Emerging Architecture Pattern for Agile Integration: Cell-based ArchitectureAn Emerging Architecture Pattern for Agile Integration: Cell-based Architecture
An Emerging Architecture Pattern for Agile Integration: Cell-based Architecture
All Things Open
 
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Asanka Abeysinghe
 

Similar to Centralisation of IAM (Identity and Access Management) 7 modern trends every it professional must know about (part 2/7) (20)

How businesses can benefit by using Shared Ledger Technology.
How businesses can benefit by using Shared Ledger Technology.How businesses can benefit by using Shared Ledger Technology.
How businesses can benefit by using Shared Ledger Technology.
 
IRJET- Hampering the Cloning Attacks in Online Social Networks
IRJET-  	  Hampering the Cloning Attacks in Online Social NetworksIRJET-  	  Hampering the Cloning Attacks in Online Social Networks
IRJET- Hampering the Cloning Attacks in Online Social Networks
 
Nine key rules of Oracle Licensing
Nine key rules of Oracle LicensingNine key rules of Oracle Licensing
Nine key rules of Oracle Licensing
 
Agile Gurugram 2016 | Conference | Why your Agile Project will fail? Softwar...
Agile Gurugram 2016 | Conference |  Why your Agile Project will fail? Softwar...Agile Gurugram 2016 | Conference |  Why your Agile Project will fail? Softwar...
Agile Gurugram 2016 | Conference | Why your Agile Project will fail? Softwar...
 
How land developers can benefit from the bitcoin phenomena.
How land developers can benefit from the bitcoin phenomena.How land developers can benefit from the bitcoin phenomena.
How land developers can benefit from the bitcoin phenomena.
 
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...
 
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"
Big Data - part 5/7 of "7 modern trends that every IT Pro should know about"
 
IRJET- Tour and Travels
IRJET- Tour and TravelsIRJET- Tour and Travels
IRJET- Tour and Travels
 
Oracle licensing rules the 5 fatal mistakes
Oracle licensing rules   the 5 fatal mistakesOracle licensing rules   the 5 fatal mistakes
Oracle licensing rules the 5 fatal mistakes
 
Web Hosting Control Panels
Web Hosting Control PanelsWeb Hosting Control Panels
Web Hosting Control Panels
 
De invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschapDe invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschap
 
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
 
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...
[WSO2 Integration Summit San Francisco 2019] Emerging Architecture Patterns- ...
 
OAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedOAuth with Salesforce - Demystified
OAuth with Salesforce - Demystified
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
 
Maximising the opportunities of the online marketplace (South Australia)
Maximising the opportunities of the online marketplace (South Australia)Maximising the opportunities of the online marketplace (South Australia)
Maximising the opportunities of the online marketplace (South Australia)
 
Kenaz project
Kenaz projectKenaz project
Kenaz project
 
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...
[WSO2 Integration Summit New York 2019] Emerging Architecture Patterns: API-c...
 
An Emerging Architecture Pattern for Agile Integration: Cell-based Architecture
An Emerging Architecture Pattern for Agile Integration: Cell-based ArchitectureAn Emerging Architecture Pattern for Agile Integration: Cell-based Architecture
An Emerging Architecture Pattern for Agile Integration: Cell-based Architecture
 
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
 

Recently uploaded

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 

Recently uploaded (20)

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 

Centralisation of IAM (Identity and Access Management) 7 modern trends every it professional must know about (part 2/7)

  • 1. 7 modern trends every IT professional must know about (Part 2/7) cc: slworking2 - https://www.flickr.com/photos/18548283@N00
  • 2. Centralisation of IAM (Identity and Access Management) cc: Thomas Hawk - https://www.flickr.com/photos/51035555243@N01
  • 3. Most applications need some authentication system to identify users and manage access to different parts of the app cc: perspec_photo88 - https://www.flickr.com/photos/111692634@N04
  • 4. This is called IAM (Identity and Access Management) cc: Sarah M Stewart - https://www.flickr.com/photos/92632631@N00
  • 5. If the user is an enterprise employee it is done via Employee IAM and for public facing resources used by customers it is done via the Customer IAM cc: aaronvandorn - https://www.flickr.com/photos/94197248@N02
  • 6. Most applications need IAM and hence changes in IAM will affect most application developers.cc: rmlowe - https://www.flickr.com/photos/8143486@N04
  • 7. IAM is handled traditionally by application developers themselves - mostly by sticking a password form at the gateway of the application - Challenging users to prove their identity. cc: Bruno Santos - https://www.flickr.com/photos/65062705@N00
  • 8. That has resulted in fragmented IAM with every application storing user passwords and implementing their own security policies. cc: the justified sinner - https://www.flickr.com/photos/54799099@N00
  • 9. From the developer perspective IAM was a necessary evil - the application was their focus of course and not the IAM. cc: kirainet - https://www.flickr.com/photos/69078600@N00
  • 10. Most developers just stored passwords in a database and checked against that database at login time issuing tokens, cookies or session ids to the client for further identification and access management. cc: jeff_golden - https://www.flickr.com/photos/46868900@N00
  • 11. This had an adverse impact on security esp. since users used the same passwords on multiple sites and security breaches and stolen passwords on one system affected many others. cc: Visual Content - https://www.flickr.com/photos/143601516@N03
  • 12. This fragmentation of IAM, lack of focus on security and lack of focus on user experience in the authentication process was problematic. But that is changing now. cc: basykes - https://www.flickr.com/photos/11399912@N00
  • 13. IAM is getting centralised - with standards like "OpenID Connect" on top of “Oauth 2.0" protocol that provide the flow needed for "OpenID Connect" cc: Jim Nix / Nomadic Pursuits - https://www.flickr.com/photos/34825346@N02
  • 14. For application developers this means that they no longer have to worry about authenticating users or handling IAM. It can now be delegated to Identity providers.cc: sk8geek - https://www.flickr.com/photos/26170836@N05
  • 15. This centralisation of the IAM means that application developers do not have to do policy making for security and no more login forms of course. cc: AJ Batac - https://www.flickr.com/photos/89309115@N00
  • 16. The best part is perhaps - No more need to store passwords by developers of individual applications. cc: The Daring Librarian - https://www.flickr.com/photos/43666171@N07
  • 17. This also means that users are more in control of their identity and can grant or revoke permissions given to any application - all from one place. cc: sp3ccylad - https://www.flickr.com/photos/46978810@N00
  • 18. The user experience is now centralised into the hands of ID providers whose focus is on security, UX and the IAM process. Centralisation will lead to better UX and better security. cc: Daniel Kulinski - https://www.flickr.com/photos/7729940@N06
  • 19. Application developers can use the flows provided by Oauth 2.0 to obtain ID tokens and use these signed ID Tokens to identify the user throughout the app. cc: vintagedept - https://www.flickr.com/photos/42826854@N00
  • 20. Since ID providers specialise in IAM, they can evolve over a period and can integrate with biometric systems and other password-less systems to make the auth process better.cc: hawaii - https://www.flickr.com/photos/35034363370@N01
  • 21. These improvements will automatically be shared by all applications that use that IDp because of centralisation. cc: ryancr - https://www.flickr.com/photos/33128961@N00
  • 22. Also all security and other policies can now be controlled from one place. Which apps should be used by which users can be controlled at one single point by "Single Sign on (SSO)” cc: andrechinn - https://www.flickr.com/photos/16167252@N00
  • 23. The proliferation of cloud apps and also mobile apps has led to this major paradigm shift in IAM and has been facilitated by OAuth 2.0 protocol and OpenID Connect.cc: Matthew Burpee - https://www.flickr.com/photos/76323119@N00
  • 24. Next part of 7 modern trends every IT professional must know about cc: yourbartender - https://www.flickr.com/photos/10164012@N00