Skip to main content

Identity Management

Identity management: deals with the creation, communication, recognition, and usage
of identity in the enterprise. Identity management includes provisioning services,
directories, multi-factor authentication, federation, and so on. All access control is
predicated on identity, a central concern to security architecture, the quality of the
system’s authentication and authorization cannot be stronger than the identity
management process. Identity management architecture is important to identify points of
leverage across projects, because identity management components are often not able to
support a business case individually. Strategically the enterprise should align investment,
architecture, and implementation in the identity space to increase the quality, reusability,
and strength of identity. The net benefit is to improve the authentication, authorization,
and auditing services for the system as a whole. The utility of the identity management
architecture comes through mapping the subject request’s claims (or assertions) to policy
enforcement decision workflow; and the object’s protection model, often in the form of
group and/or role membership.

Comments

Popular posts from this blog

Indian Education System : Let's shape it

Good advice is always certain to be ignored, but that's no reason not to give it.                                                                                        By Agatha Christie   This is one of the things that I wanted to write from long back and per my opinion it should be matter of at most important for any educated person of India. Today in this article I would like  focus on reminding people about the importance of education and educational departments  no matter those are government related or privately held. Whatever we are to...

Mobile Message Organizer

Got a basic requirement that i think every mobile should have, all the mail clients have this facility and i dont see any big difficulties on this other than the storage problem which is not a problem at all as we got GB of spaces in our memory cards. Well i am talking about the organizing the messages in Inbox , categorization of messages. Suppose i want to store all the messages from one of my friend say A in a folder called Personal, my existing mobile device Nokai E71 doesn't have this feature inbuilt (Ofcourse if you want you can make a folder and move the messages manually but here i am talking about the idea of automating this procedure). Only thing we need to do is , we have to store the rules in separate location , rules will be defined by the user and then device will follow these rules.There are no or very less software available which satisfy this requirement for mobile device.this is so simple but basic requirement as per the end user. I am going to make this one ...

Microservices Architecture, A developer's Prespective

Microservices architecture addresses many concern of application development but does not solve all the problems. It has its own advantages and limitations. In order to understand it fully, we need to understand one common architecture pattern in practice, i.e. Monolithic Architecture Monolithic architecture are highly tightly coupled and you can’t change something without impacting other. Look at this building and tell me how easy it is to change Let’s take an example of an e-commerce website that has many components and services i.e. Order service Invoice service Payment services will talk to various payment gateways. User Administration services. Graphical user interface for web, WAP and for various mobile platform like android, iOS, blackberry etc. Database services, possibly more than one database will be involved. Now let’s see what are some common problems associated with it Ever Growing Container size Generally all these components are packaged in one ...