Site icon Tutorial

Identity Access Management

Go back to Tutorial

Identity management is the set of business processes, and a supporting infrastructure for the creation, maintenance, and use of digital identities. Identity Management also called as identity and Access Management (or IAM).

Managing identities and access control for cloud computing applications remains one of the greatest challenges. Identity management (IDM) also assumes a significant part of cloud security. Cloud deployments are dynamic with servers, IP addresses and services started or decommissioned or re-started thus, needing dynamic governance of typical IDM issues like, provisioning/de-provisioning, synchronization, entitlement, lifecycle management, etc.

Main components

Identity Management processes

Technical terminologies used

Identity Lifecycle Management

A lifecycle is a term to describe how persons or accounts for a person are created, managed, and terminated based on certain events or a time-based paradigm. The cycle represents a closed-loop process where a user is registered to use an IT asset, an account is created, and access provisioning occurs to give this user account access to system resources. Over time modifications occur where access to some resources is granted while access to other resources may be revoked. The cycle ends when the user separates from the business and the termination process removes access. It involves various phases as

the various elements as

Users should experience changes in access rights as the organization changes and as their roles within the organization change.

Identity Management Systems

Various identity management systems used are discussed

OpenID

With OpenID a user uses one username and one password to access many web applications. The user authenticate to an OpenID server to get his/her OpenID and use the token to authenticate to web applications. A user of OpenID does not need to provide a service provider with his credentials or other sensitive information such as an email address.

OpenID is a decentralized authentication protocol with no central authority approve or register OpenID Providers. An end user can freely choose which OpenID Provider (OP or OpenID Authentication server) on which a service provider relies to assert the authenticity of identity of the consumer) to use, and can preserve their Identifier if they switch OpenID Providers.

OpenID is highly susceptible to phishing attacks, as the whole OpenID structure hinges on the URL routing to the correct machine on the Internet i.e. the OpenID Provider. A user who visits an evil site (through conventional phishing or DNS cache poisoning), sends the imposter service provider her URL. The provider consults the URL’s content to determine the location of her OP (OpenID provider). Instead of redirecting the user to the legitimate OP, it redirects her to the Evil Scooper site. The Evil Scooper contacts the legitimate OP and pulls down an exact replica of its login experience (it can even simply become a “man in the middle”). Convinced she is talking to her OP, the user posts her credentials (username and password) which can now be used by the Evil Scooper to get tokens from the legitimate OP. These tokens can then be used to gain access to any legitimate Service Provider.

PRIME (Privacy and Identity Management for Europe)

PRIME, is a single application — the PRIME Console — that handles user’s personal data. It handles management and disclosure of personal data for the user (e.g. informed consent of the user to be established and privacy risks to be conveyed, through a user interface) and is the interface to the PRIME technology.

The Console requires installation and configuration. The user manages her personal data using the console, discloses personal data, and checks the proper handling of her data by the various services she requires. The client application mirrors the server application used by the service provider.

A major challenge for a large scale adoption of PRIME technology is that it requires both individuals and service providers to implement the PRIME middleware, on both sides. Another prerequisite for large scale adoption is interoperability. PRIME, stands no chance unless it allows interoperability with existing applications and other identity management systems. This calls for standardization.

Go back to Tutorial

Exit mobile version