This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 43 lines
!!! Overview[1]
[{$pagename}] ([IRM]) solutions that are able to satisfy the business needs of an organization and the new values of the CIO will shape the future of [Identity And Access Management|Identity and Access Management]
[{$pagename}] is a [Kantara Initiative] about working with [Identity Relations]
The shift to [Cloud computing], [Social Networks|Social Websites], [mobile Devices], and [Software as a Service] is revolutionizing the enterprise, and [Identity and Access Management] needs to evolve to help businesses capture new opportunities without worrying about the associated complexities that are a result of this change.
!! [{$pagename}] Concept
Do, or should, we value a [Digital Identity] or is the value within the [Identity Relation] between the two [Identities|Digital Identity] that is of value?
! The Problem
Even though many [organizational Entity] believe it is their duty to create their own [IAM] services that ask users to create personalized log-ins, as well as to share more and more [data]. However, by doing so, these [organizations|organizational Entity] introduce higher degrees of information [risk].
! Why do organizations create their own [IAM] systems?
There are many answers to this question: perhaps they believe that a strong perimeter is the only way to be secure and the collection of personal data may prove to be a valuable resource that is waiting to be prioritized, or because they may have not completed an internal risk assessment to identify and measure the risk of holding and managing personal data against the potential profits.
This shift in business emphasis has a direct technical impact on how we think about [Identity and Access Management]. Through this shift we have come to value:
! INTERNET SCALE over enterprise scale
Today’s users access secure systems not just on premises, but in the cloud and via the Internet, any time, day or night. Today’s users are not just employees logging on at work but also partners, customers, and devices signing in from anywhere. As the number of users grows exponentially, modern IRM systems must be able to accommodate hundreds, thousands, or even millions of additional identities instantaneously, achieving a scalable volume that was neither possible nor needed for the enterprise, but is essential in an Internet-connected, consumer-facing world.
! DYNAMIC INTELLIGENCE over static intelligence
Traditional [Identity And Access Management|Identity and Access Management] was designed for a specific set of events – employee on and off-boarding, for example, taking place in a predictable on premises work environment. Today’s [{$pagename}] must understand the circumstances in order to determine whether or not you get access, and if so, how much and to what? If you log in from a new device or from a different country, for example, a modern, adaptable [{$pagename}] system will adjust to the uncertain circumstances and ask you for additional [authentication] beyond a simple password.
! BORDERLESS over perimeter
Once upon a time, employees arrived at the office, logged into secure systems and logged back off at the end of the day. In today’s work-from-anywhere culture, employees, as well as partners and customers need access from laptops, phones, tablets and even cars. They access secure data stored not only on company premises, but also in the cloud and hosted by [Software as a service|Software as a Service] providers.
! MODULAR over [Monolithic Architecture]
Today’s [{$pagename}] demands are much more complex than those of traditional [Identity And Access Management|Identity and Access Management]. A good [{$pagename}] solution is designed from the ground up as an integrated, cohesive stack that is purpose-built to handle complexity. Traditional [Identity And Access Management|Identity and Access Management], typically built piecemeal through acquisitions and tacking on parts as needs arise, struggles to respond to the multitude of users, circumstances, devices, access points, and access privileges that dominate today’s [{$pagename}] world.
!! Three Digital Identity Framworks
* [Organizational Identity]
* [Third-party Identity Provider]
* [Self-Sovereign Identity]
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Identity Relationship Management|https://kantarainitiative.org/irmpillars/|target='_blank'] - based on information obtained 2016-09-06-