Identity management: deals with the creation, communication, recognition, and usage
of identity in the enterprise. Identity management includes provisioning services,
directories, multi-factor authentication, federation, and so on. All access control is
predicated on identity, a central concern to security architecture, the quality of the
system’s authentication and authorization cannot be stronger than the identity
management process. Identity management architecture is important to identify points of
leverage across projects, because identity management components are often not able to
support a business case individually. Strategically the enterprise should align investment,
architecture, and implementation in the identity space to increase the quality, reusability,
and strength of identity. The net benefit is to improve the authentication, authorization,
and auditing services for the system as a whole. The utility of the identity management
architecture comes through mapping the subject request’s claims (or assertions) to policy
enforcement decision workflow; and the object’s protection model, often in the form of
group and/or role membership.
of identity in the enterprise. Identity management includes provisioning services,
directories, multi-factor authentication, federation, and so on. All access control is
predicated on identity, a central concern to security architecture, the quality of the
system’s authentication and authorization cannot be stronger than the identity
management process. Identity management architecture is important to identify points of
leverage across projects, because identity management components are often not able to
support a business case individually. Strategically the enterprise should align investment,
architecture, and implementation in the identity space to increase the quality, reusability,
and strength of identity. The net benefit is to improve the authentication, authorization,
and auditing services for the system as a whole. The utility of the identity management
architecture comes through mapping the subject request’s claims (or assertions) to policy
enforcement decision workflow; and the object’s protection model, often in the form of
group and/or role membership.
Comments
Post a Comment