Identity and Access Management IAM has recently emerged as a critical foundation for
realizing the business benefits in terms of cost savings, management control, operational
efficiency, and, most importantly, business growth for eCommerce. Today, almost all businesses
conduct their commerce through open doors—whether it is through a Web site, allowing business partners to
access the company’s IT resources, or conducting business through a storefront. As Web services becomes
more mainstream, that openness will significantly increase. It is clear that the doors of the enterprise are definitely wide open for business. While this openness provides business opportunities, it also presents security challenges and potential risks.Moreover, they must provide this access for a growing number of
identities, both inside and outside the organization.
It is no longer sufficient to just manage passwords. When trading partners, customers or employees are
allowed broader access to the infrastructure, it is important to carefully identify who the user is, what they need access to, what they have access to, what they can do and what can be done with their information, all while ensuring compliance with corporate policies.
IAM comprises of people, processes and products to manage identities and access to
resources of an enterprise. Additionally, the enterprise shall have to ensure the
correctness of data in order for the IAM Framework to function properly. IAM
components can be classified into 4 major categories: authentication, authorization, user
management and central user repository. The ultimate goal of
IAM Framework is to provide the right people with the right access at the right time.
Authentication
This area is comprised of authentication management and session management.
Authentication is the module through which a user provides sufficient credentials to gain
initial access to an application system or a particular resource. Once a user is
authenticated, a session is created and referred during the interaction between the user
and the application system until the user logs off or the session is terminated by other
means (e.g. timeout). By centrally maintaining the session of a user, the authentication module provides Single Sign-On service so that the user needs not logon again when accesses another application.
Authorization
Authorization is the module that determines whether a user is permitted to access a
particular resource. Authorization is performed by checking the resource access request,
typically in the form of an URL in web-based application, against authorization policies
that are stored in an IAM policy store. Authorization is the core module that implements
role-based access control.
User Management
This area is comprised of user management, password management, role/group
management and user/group provisioning. User management module defines the set of
administrative functions such as identity creation, propagation, and maintenance of user
identity and privileges. One of its components is user life cycle management that enables
an enterprise to manage the lifespan of a user account, from the initial stage of
provisioning to the final stage of de-provisioning.
Self-service is another key concept within user management. Through self-profile
management service an enterprise benefits from timely update and accurate maintenance
of identity data. Another popular self-service function is self-password reset, which
significantly alleviates the help desk workload to handle password reset requests.
User management requires an integrated workflow capability to approve some user
actions such as user account provisioning and de-provisioning.
Central User Repository
Central User Repository stores and delivers identity information to other services, and
provides service to verify credentials submitted from clients. The Central User
Repository presents an aggregate or logical view of identities of an enterprise. Directory
services adopting LDAPv3 standards have become the dominant technology for Central
User Repository.
IAM Life Cycle
Figure: IAM Life Cycle |
Figure depicts the identity management lifecycle;
• User Provisioning: The identity management lifecycle begins with the provisioning of the user.
• User Management: Once the user is provisioned, the next phase of identity management is the ongoing
maintenance of the users’ access rights, passwords, and accounts. Applying policy-based
management to the user’s identity can assist in automating the management of access control. For
example, policies can be set up that define the resources, applications and functions that a user in the
accounting department should have access to.
• Policy Management: Policy-based management is the glue that pulls all of this together. It allows
automatic updating of access rights, based on membership in a particular group or department. In
addition, it also ensures that corporate policies are enforced consistently across the enterprise.
• Privacy: In response to privacy regulations, enterprises must secure the privacy of certain types of
information that are related to specific individuals.
• Account Closure: Deleting the account when the identity is no longer needed.