SlideShare a Scribd company logo
1 of 41
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in
any form without Gartner's prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on
gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness
or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research
organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a
discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its
shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these
firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information
on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity."
Lori Robinson
lori.robinson@gartner.com
IAM for the Masses: Managing
Consumer Identities
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Gartner delivers the technology-related
insight necessary for our clients to make
the right decisions, every day.
1
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Nexus of forces
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Anytime, anywhere, any device
3
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Social permeates business
• BYOI
• Marketing
• Customer interactions
• Internal communication
4
Enterprise
Personal
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Physical & virtual worlds Mmrge
Trainer
Doctor
Insurance Agent
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
The digital business has arrived!
6
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 7
Identity (circa) 2014…
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 8
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 9
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 10
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
• Government-to-citizen (G2C)
• Application-to-Application (A2A)
• Things-to-things (T2T)
Many relationships to manage…
• Business-to-employee (B2E)
• Business-to-business (B2B)
• Business-to-consumer (B2C)
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Consumer IAM Characteristics
12
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
13
Consumer Employee
Massive Scale
Medium to
Large
Distributed Control Centralized
Individual Focus Business
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
It’s about relationships & data!
• Consumer IAM is marketing & revenue driven
• CMO often sponsors project
• User experience impacts revenue: login is the
front door to the digital storefront
• Identity data is the new gold!
- Personalization & contextualization
- Targeted marketing
- Direct sell of ID data
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Consumer IAM Requirements
15
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 16
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Balance benefit vs. risk
• Protect individuals’ privacy while maximizing the
value of consumer data
Revenue Privacy
Consent &
Permission
Choice &
Control
Transparency
Data sharing &
federation
Personalization
Consumer
Profile Data
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
• Ensure that users are
who they say they
are.
• Make sure the right
users get access to
the right information.
Secure individual & business assets
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
User experience matters!
19
• Simplified
• Seamless across domains
• Mobile optimized
• Personalized & Contextualized
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Scale to the Masses
• Ability to support millions of identities
• Available 24 x 7 x 365
• Ensure throughput
• Performance at scale
20
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Ensure Agility
21
Employee Contractor Vendor Partner Customer Public
Traditional Hybrid Modern
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Consumer IAM: Technical
Approaches
22
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Registration
• Self-service registration
• Delegated administration
• Social identities
• Just-in-time (JIT) provisioning
• User account provisioning
Note: Consumer identities are typically only de-
provisioned or deleted upon consumer request)
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Identity assurance levels
24
Generic/
Guest
Social
Identity
Registered
User
Vetted
Identity
Low Assurance High Assurance
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Data validation & identity proofing
- Data validation
• Data structure rules
• Data verification (e.g. email address, credit card data)
- Identity proofing
• E-mail verification
• KBA
• Identity matching & scoring
• Telephone caller id
• Device fingerprinting
• Social footprint
25
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Consumer profile management
• Consumer profile management tools allow user
to:
- Set user preferences
- Manager user name and password
- Control privacy settings
- Populate identity attributes:
• User volunteered: Progressive Profiling
• Social sharing
26
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Data collection, aggregation, & storage
27
• Identity store must scale for the masses
• Consumer data is dispersed across multiple
sources
• Identity Store:
• Databases
• Special purpose directories
• Data synchronization:
• Virtual directories
• Meta-directories
• User provisioning
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Authorization
• Rules
• Roles
• Group membership
• OAuth
• Externalized Auth
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Authentication
• Username/Password combo
• Multifactor authentication:
- Knowledge-based authentication (pins, images,
personal information, historical information, and so on)
- One-time passwords (often using mobile devices)
- Out of band (email, SMS, mobile device, phone)
• Federation/ Social Login (SAML, OpenID
Connect, OAuth)
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Authentication
• Adaptive Access Control
30
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Audit
• Focus on protecting both the business' assets
and consumers' privacy
• Differs from enterprise IAM audits
• Includes:
- Reporting
- Real-time Monitoring
- Fraud Detection
- Behavioral/Contextual Analysis
- SIEM and GRC Integration
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Additional Considerations
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Standards and protocols
• SAML 2.0
• OAuth 2.0
• Open ID Connect
• SCIM 1.1
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
REST
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Technology maturity
• Not all technologies are equal on the maturity scale.
• Provisioning, workflow, LDAP, enterprise federation,
and audit technologies are established, more
mature.
• Federated and user-centric technologies are still
evolving, less mature.
• Some "old school" technologies like directories are
being revamped to handle massive scale.
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Who can manage identities for me?
Outsourcing alternatives
• Social Identities
• Federation Hubs
• Identity Providers
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Recommendations
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Recommendations
Build an IAM program specific to consumers:
Consumer IAM use cases are not necessarily
the same as employee IAM use cases.
Understand who the business stakeholders are
for the consumer IAM program.
Integrate existing IAM infrastructure wherever
possible.
Design a consumer IAM infrastructure that not
only protects the business, but ensures the
privacy of the consumer.
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Recommendations
Consider using social identities (for low-assurance
transactions).
Deploy identity proofing for higher assurance.
Preprovision only when you have to: Use JIT.
Use a scalable/purpose-built directory or
database.
Implement stronger authentication mechanisms.
Implement adaptive access controls.
Utilize standards as much as possible.
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Recommended Gartner Research
 Guidance Framework for Managing Consumer
Identities
Lori Robinson
 Understanding Modern Federation Trends and Their
Influence on Identity and Access Architecture
Mary E. Ruddy (G00251840)
 Adaptive Access Control Brings Together Identity,
Risk and Context
Trent Henry (G00250319)
 Deploying OAuth and OpenID Connect for Enterprise
Use Cases
Mary E. Ruddy (G00252923)For more information, stop by Gartner Research Zone.

More Related Content

What's hot

Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...ForgeRock
 
Winning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and TrustWinning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and TrustForgeRock
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Enterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesEnterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesWSO2
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesBenjamin Canner
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Cloud identity access management market
Cloud identity access management marketCloud identity access management market
Cloud identity access management marketAllied Market Research
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Identity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionIdentity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionForgeRock
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationWSO2
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 

What's hot (20)

Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
 
Winning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and TrustWinning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and Trust
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Enterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesEnterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use Cases
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Cloud identity access management market
Cloud identity access management marketCloud identity access management market
Cloud identity access management market
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Identity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionIdentity Relationship Management: The Community Revolution
Identity Relationship Management: The Community Revolution
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 

Viewers also liked

IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionCA API Management
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Consumer Identity Management
Consumer Identity ManagementConsumer Identity Management
Consumer Identity Managementwebhostingguy
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel ClubGigya
 
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM Patrick Harding
 
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORMIdentity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORMForgeRock
 
Data Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceData Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceGigya
 
User Management SaaS
User Management SaaSUser Management SaaS
User Management SaaSEmmanuel Ide
 
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...ForgeRock
 
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityFederation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityCA API Management
 
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...ForgeRock
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCloudIDSummit
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...IBM Security
 
Scaling wix with microservices architecture devoxx London 2015
Scaling wix with microservices architecture devoxx London 2015Scaling wix with microservices architecture devoxx London 2015
Scaling wix with microservices architecture devoxx London 2015Aviran Mordo
 
Rotary.23.august2016
Rotary.23.august2016Rotary.23.august2016
Rotary.23.august2016Ida Borch
 

Viewers also liked (20)

IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Consumer Identity Management
Consumer Identity ManagementConsumer Identity Management
Consumer Identity Management
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel Club
 
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORMIdentity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
 
Data Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceData Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple Choice
 
User Management SaaS
User Management SaaSUser Management SaaS
User Management SaaS
 
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
 
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityFederation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
 
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
Mobile Persuasion
Mobile PersuasionMobile Persuasion
Mobile Persuasion
 
Scaling wix with microservices architecture devoxx London 2015
Scaling wix with microservices architecture devoxx London 2015Scaling wix with microservices architecture devoxx London 2015
Scaling wix with microservices architecture devoxx London 2015
 
Rotary.23.august2016
Rotary.23.august2016Rotary.23.august2016
Rotary.23.august2016
 

Similar to IAM for the Masses: Managing Consumer Identities

Dr. Zafar Chaudry, M.D., Gartner Group: Fluid Healthcare – Gartner’s Nexus of...
Dr. Zafar Chaudry, M.D., Gartner Group: Fluid Healthcare – Gartner’s Nexus of...Dr. Zafar Chaudry, M.D., Gartner Group: Fluid Healthcare – Gartner’s Nexus of...
Dr. Zafar Chaudry, M.D., Gartner Group: Fluid Healthcare – Gartner’s Nexus of...Microsoft Österreich
 
The Revolutionary Impact of the Cloud by Arun Chandrasekaran
The Revolutionary Impact of the Cloud by Arun ChandrasekaranThe Revolutionary Impact of the Cloud by Arun Chandrasekaran
The Revolutionary Impact of the Cloud by Arun ChandrasekaranPoh Lee
 
JahiaOne 2015 - Gartner Keynote on UXP by Gene Phifer
JahiaOne 2015 - Gartner Keynote on UXP by Gene PhiferJahiaOne 2015 - Gartner Keynote on UXP by Gene Phifer
JahiaOne 2015 - Gartner Keynote on UXP by Gene PhiferJahia Solutions Group
 
As Novas Tecnologias e o Potencial de Inovação em Governo
As Novas Tecnologias e o Potencial de Inovação em GovernoAs Novas Tecnologias e o Potencial de Inovação em Governo
As Novas Tecnologias e o Potencial de Inovação em GovernoinovaDay .
 
How to Use Hybrid Integration Platforms Effectively
How to Use Hybrid Integration Platforms EffectivelyHow to Use Hybrid Integration Platforms Effectively
How to Use Hybrid Integration Platforms EffectivelyMuleSoft
 
Gartner - The real economics of byod
Gartner - The real economics of byodGartner - The real economics of byod
Gartner - The real economics of byodmParticle
 
Business analytics from basics to value
Business analytics from basics to valueBusiness analytics from basics to value
Business analytics from basics to valuesucesuminas
 
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...WSO2
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of ThingsPECB
 
SaaStock 2019 - thibaut de lataillade 2
SaaStock 2019 -  thibaut de lataillade 2SaaStock 2019 -  thibaut de lataillade 2
SaaStock 2019 - thibaut de lataillade 2SaaStock
 
Paul Lord, Gartner – “From Out-Sourcing to Optimization: Making Sense of Stra...
Paul Lord, Gartner – “From Out-Sourcing to Optimization: Making Sense of Stra...Paul Lord, Gartner – “From Out-Sourcing to Optimization: Making Sense of Stra...
Paul Lord, Gartner – “From Out-Sourcing to Optimization: Making Sense of Stra...Elemica
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...Mintigo1
 
Retrospectiva Encontro de CIOs 2013 - Gartner
Retrospectiva Encontro de CIOs 2013 - Gartner Retrospectiva Encontro de CIOs 2013 - Gartner
Retrospectiva Encontro de CIOs 2013 - Gartner sucesuminas
 
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...Amazon Web Services
 
Why spatial data governance is critical to your business strategy
Why spatial data governance is critical to your business strategyWhy spatial data governance is critical to your business strategy
Why spatial data governance is critical to your business strategyPrecisely
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCloudIDSummit
 
CIO Agenda 2015 - Flipping Into Digital Leadership
CIO Agenda 2015 - Flipping Into Digital LeadershipCIO Agenda 2015 - Flipping Into Digital Leadership
CIO Agenda 2015 - Flipping Into Digital LeadershipDerek Mulrey
 
Leveraging knowledgelevers
Leveraging knowledgeleversLeveraging knowledgelevers
Leveraging knowledgeleversKnowledgelevers
 

Similar to IAM for the Masses: Managing Consumer Identities (20)

Nexus of Forces
Nexus of ForcesNexus of Forces
Nexus of Forces
 
Dr. Zafar Chaudry, M.D., Gartner Group: Fluid Healthcare – Gartner’s Nexus of...
Dr. Zafar Chaudry, M.D., Gartner Group: Fluid Healthcare – Gartner’s Nexus of...Dr. Zafar Chaudry, M.D., Gartner Group: Fluid Healthcare – Gartner’s Nexus of...
Dr. Zafar Chaudry, M.D., Gartner Group: Fluid Healthcare – Gartner’s Nexus of...
 
The Revolutionary Impact of the Cloud by Arun Chandrasekaran
The Revolutionary Impact of the Cloud by Arun ChandrasekaranThe Revolutionary Impact of the Cloud by Arun Chandrasekaran
The Revolutionary Impact of the Cloud by Arun Chandrasekaran
 
JahiaOne 2015 - Gartner Keynote on UXP by Gene Phifer
JahiaOne 2015 - Gartner Keynote on UXP by Gene PhiferJahiaOne 2015 - Gartner Keynote on UXP by Gene Phifer
JahiaOne 2015 - Gartner Keynote on UXP by Gene Phifer
 
As Novas Tecnologias e o Potencial de Inovação em Governo
As Novas Tecnologias e o Potencial de Inovação em GovernoAs Novas Tecnologias e o Potencial de Inovação em Governo
As Novas Tecnologias e o Potencial de Inovação em Governo
 
How to Use Hybrid Integration Platforms Effectively
How to Use Hybrid Integration Platforms EffectivelyHow to Use Hybrid Integration Platforms Effectively
How to Use Hybrid Integration Platforms Effectively
 
Gartner - The real economics of byod
Gartner - The real economics of byodGartner - The real economics of byod
Gartner - The real economics of byod
 
Business analytics from basics to value
Business analytics from basics to valueBusiness analytics from basics to value
Business analytics from basics to value
 
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
SaaStock 2019 - thibaut de lataillade 2
SaaStock 2019 -  thibaut de lataillade 2SaaStock 2019 -  thibaut de lataillade 2
SaaStock 2019 - thibaut de lataillade 2
 
Paul Lord, Gartner – “From Out-Sourcing to Optimization: Making Sense of Stra...
Paul Lord, Gartner – “From Out-Sourcing to Optimization: Making Sense of Stra...Paul Lord, Gartner – “From Out-Sourcing to Optimization: Making Sense of Stra...
Paul Lord, Gartner – “From Out-Sourcing to Optimization: Making Sense of Stra...
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...
 
Retrospectiva Encontro de CIOs 2013 - Gartner
Retrospectiva Encontro de CIOs 2013 - Gartner Retrospectiva Encontro de CIOs 2013 - Gartner
Retrospectiva Encontro de CIOs 2013 - Gartner
 
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...
 
Why spatial data governance is critical to your business strategy
Why spatial data governance is critical to your business strategyWhy spatial data governance is critical to your business strategy
Why spatial data governance is critical to your business strategy
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOID
 
CIO Agenda 2015 - Flipping Into Digital Leadership
CIO Agenda 2015 - Flipping Into Digital LeadershipCIO Agenda 2015 - Flipping Into Digital Leadership
CIO Agenda 2015 - Flipping Into Digital Leadership
 
Leveraging knowledgelevers
Leveraging knowledgeleversLeveraging knowledgelevers
Leveraging knowledgelevers
 

More from ForgeRock

Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilCustomer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilForgeRock
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessForgeRock
 

More from ForgeRock (20)

Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilCustomer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah Khalil
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 

Recently uploaded

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 

Recently uploaded (20)

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 

IAM for the Masses: Managing Consumer Identities

  • 1. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity." Lori Robinson lori.robinson@gartner.com IAM for the Masses: Managing Consumer Identities
  • 2. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day. 1
  • 3. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Nexus of forces
  • 4. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Anytime, anywhere, any device 3
  • 5. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Social permeates business • BYOI • Marketing • Customer interactions • Internal communication 4 Enterprise Personal
  • 6. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Physical & virtual worlds Mmrge Trainer Doctor Insurance Agent
  • 7. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. The digital business has arrived! 6
  • 8. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 7 Identity (circa) 2014…
  • 9. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 8
  • 10. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 9
  • 11. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 10
  • 12. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. • Government-to-citizen (G2C) • Application-to-Application (A2A) • Things-to-things (T2T) Many relationships to manage… • Business-to-employee (B2E) • Business-to-business (B2B) • Business-to-consumer (B2C)
  • 13. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Consumer IAM Characteristics 12
  • 14. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 13 Consumer Employee Massive Scale Medium to Large Distributed Control Centralized Individual Focus Business
  • 15. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. It’s about relationships & data! • Consumer IAM is marketing & revenue driven • CMO often sponsors project • User experience impacts revenue: login is the front door to the digital storefront • Identity data is the new gold! - Personalization & contextualization - Targeted marketing - Direct sell of ID data
  • 16. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Consumer IAM Requirements 15
  • 17. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 16
  • 18. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Balance benefit vs. risk • Protect individuals’ privacy while maximizing the value of consumer data Revenue Privacy Consent & Permission Choice & Control Transparency Data sharing & federation Personalization Consumer Profile Data
  • 19. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. • Ensure that users are who they say they are. • Make sure the right users get access to the right information. Secure individual & business assets
  • 20. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. User experience matters! 19 • Simplified • Seamless across domains • Mobile optimized • Personalized & Contextualized
  • 21. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Scale to the Masses • Ability to support millions of identities • Available 24 x 7 x 365 • Ensure throughput • Performance at scale 20
  • 22. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Ensure Agility 21 Employee Contractor Vendor Partner Customer Public Traditional Hybrid Modern
  • 23. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Consumer IAM: Technical Approaches 22
  • 24. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Registration • Self-service registration • Delegated administration • Social identities • Just-in-time (JIT) provisioning • User account provisioning Note: Consumer identities are typically only de- provisioned or deleted upon consumer request)
  • 25. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Identity assurance levels 24 Generic/ Guest Social Identity Registered User Vetted Identity Low Assurance High Assurance
  • 26. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Data validation & identity proofing - Data validation • Data structure rules • Data verification (e.g. email address, credit card data) - Identity proofing • E-mail verification • KBA • Identity matching & scoring • Telephone caller id • Device fingerprinting • Social footprint 25
  • 27. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Consumer profile management • Consumer profile management tools allow user to: - Set user preferences - Manager user name and password - Control privacy settings - Populate identity attributes: • User volunteered: Progressive Profiling • Social sharing 26
  • 28. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Data collection, aggregation, & storage 27 • Identity store must scale for the masses • Consumer data is dispersed across multiple sources • Identity Store: • Databases • Special purpose directories • Data synchronization: • Virtual directories • Meta-directories • User provisioning
  • 29. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Authorization • Rules • Roles • Group membership • OAuth • Externalized Auth
  • 30. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Authentication • Username/Password combo • Multifactor authentication: - Knowledge-based authentication (pins, images, personal information, historical information, and so on) - One-time passwords (often using mobile devices) - Out of band (email, SMS, mobile device, phone) • Federation/ Social Login (SAML, OpenID Connect, OAuth)
  • 31. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Authentication • Adaptive Access Control 30
  • 32. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Audit • Focus on protecting both the business' assets and consumers' privacy • Differs from enterprise IAM audits • Includes: - Reporting - Real-time Monitoring - Fraud Detection - Behavioral/Contextual Analysis - SIEM and GRC Integration
  • 33. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Additional Considerations
  • 34. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Standards and protocols • SAML 2.0 • OAuth 2.0 • Open ID Connect • SCIM 1.1
  • 35. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. REST
  • 36. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Technology maturity • Not all technologies are equal on the maturity scale. • Provisioning, workflow, LDAP, enterprise federation, and audit technologies are established, more mature. • Federated and user-centric technologies are still evolving, less mature. • Some "old school" technologies like directories are being revamped to handle massive scale.
  • 37. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Who can manage identities for me? Outsourcing alternatives • Social Identities • Federation Hubs • Identity Providers
  • 38. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Recommendations
  • 39. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Recommendations Build an IAM program specific to consumers: Consumer IAM use cases are not necessarily the same as employee IAM use cases. Understand who the business stakeholders are for the consumer IAM program. Integrate existing IAM infrastructure wherever possible. Design a consumer IAM infrastructure that not only protects the business, but ensures the privacy of the consumer.
  • 40. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Recommendations Consider using social identities (for low-assurance transactions). Deploy identity proofing for higher assurance. Preprovision only when you have to: Use JIT. Use a scalable/purpose-built directory or database. Implement stronger authentication mechanisms. Implement adaptive access controls. Utilize standards as much as possible.
  • 41. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Recommended Gartner Research  Guidance Framework for Managing Consumer Identities Lori Robinson  Understanding Modern Federation Trends and Their Influence on Identity and Access Architecture Mary E. Ruddy (G00251840)  Adaptive Access Control Brings Together Identity, Risk and Context Trent Henry (G00250319)  Deploying OAuth and OpenID Connect for Enterprise Use Cases Mary E. Ruddy (G00252923)For more information, stop by Gartner Research Zone.