FB pixel

Overcoming last mile identity management challenges

Overcoming last mile identity management challenges
 

By Steve Lay, Senior Sales Engineer at Strata Identity

Managing identities across an enterprise is a daunting task. A proliferation of users, applications, devices, and clouds introduces formidable barriers to both IT operations and security. Nowhere is the situation more challenging than at last mile access, where authentication butts up against the harsh realities of business — and cybersecurity.

In many cases, the last mile is where frameworks break down, and problems pop up. A mix of proprietary protocols and approaches — different applications often rely on different tools and standards — leads to challenges for network architects, developers, IT groups, security staff, and others. Enforcing policies across legacy and multi-cloud applications can prove tricky and time-consuming.

Fortunately, there’s a way to sidestep the pain caused by last-mile identity challenges. Identity orchestration has the power to abstract identity and policy data from applications without making any code changes while introducing a framework that fully supports all modern identity standards.

This approach typically lowers costs, improves operational efficiency, and boosts security. It also frees software developers and other teams to tackle higher-value tasks.

Lack of standards introduces risk

At the heart of the challenge is a simple fact. A typical enterprise runs hundreds or even thousands of applications. While each software package has authentication and other security protections built in — anything from basic password logins to multi-factor authentication (MFA) or passwordless technology — there’s no uniformity across the stack.

All of this results in a lack of standardization across authentication and authorization mechanisms. Within legacy applications, the result is a lack of support for modern identity protocols such as OAuth, FIDO2, and SAML. In addition, many enterprises struggle to integrate data from individual apps with identity management systems.

In the cloud, the complexities expand further. A diverse and decentralized application ecosystem often leads to varying levels of identity protocol support across cloud providers and inconsistent enforcement of identity policies across cloud apps.

Either way, organizations frequently find themselves addressing tedious tasks, including the need to make modifications to apps, often through direct coding. The problem is especially common for non-standards-based applications including forms that rely on headers, local account authentication (LDAP or database typically), or other proprietary mechanisms.

Again, as all the connection points multiply, particularly in multi-cloud environments — organizations often find themselves struggling to keep up. What’s more, overhead and technical debt continue to accumulate.

Identity orchestration as an instrument for change

Tackling the last mile challenge is paramount. Unifying policy enforcement for hybrid environments is critical. Identity orchestration can rein in the chaos. This abstracted framework — which floats free of all the individual apps and systems — serves as a virtual traffic cop. It supports all modern identity standards and ensures that the right policy is applied at the right place and at the right time.

With this last mile enforcement framework in place, an organization can deploy modern security methods such as MFA or passkeys on a widespread yet granular basis. It can enable and disable accounts based on specific concerns, criteria and events. What’s more, identity orchestration closes many of the entry points that hackers and attackers use to enter a network and do damage.

An enterprise can also adopt standardized identity protocols like OAuth, OpenID Connect and FIDO2 — and even combine and intertwine them in highly strategic ways. This makes it possible to deploy modern technologies more strategically and swap them out universally when newer protocols appear. What’s more, nothing ever touches the actual application.

Getting to Zero

The result is best practice policy enforcement, authentication and access control at enterprise scale — with Zero Trust and least privileged models in place. In addition to the enterprise achieving significant gains, customers, business partners, employees and others all potentially benefit.

With identity orchestration, an organization can unify the management and enforcement of proprietary and incompatible identity policies across both legacy IT and multi-cloud frameworks. Suddenly, the last mile of identity management and authentication becomes more secure and less complicated to administer.

About the author

Steve Lay is Senior Sales Engineer at Strata Identity. He has more than 16 years of customer-facing experience in identity management with SailPoint, Sirius Computer Solutions and IBM.

DISCLAIMER: Biometric Update’s Industry Insights are submitted content. The views expressed in this post are that of the author, and don’t necessarily reflect the views of Biometric Update.

Related Posts

Article Topics

 |   |   |   |   |   |   |   | 

Latest Biometrics News

 

OCR Studio expands KYC fraud detection for AI-generated identity documents

Fake documents made with the help of generative AI are becoming increasingly more convincing. Document analysis and data extraction software…

 

ID4Africa speakers urge legal identity inclusion for refugees, stateless persons

African governments must accelerate efforts to provide legal and digital identity to refugees and stateless populations, according to speakers at…

 

Biometrics lawyer Dan Saeedi talks BIPA on Biometric Update Podcast

Dan Saeedi is a BIPA buster. The renowned Chicago attorney, CIPP/US,a partner and team co-lead of the biometric privacy team…

 

World Bank, African DPAs outline formula for trusted digital identity, DPI

Trust has moved steadily to the center of the conversation around digital public infrastructure and identity at ID4Africa, and the…

 

UK watchdog warns of legal risks as London police deploy LFR at protest

London’s Metropolitan Police will deploy live facial recognition (LFR) technology at a protest for the first time this weekend, prompting…

 

Age assurance debate arrives in Bangladesh

The dominos continue to fall in the game of global online safety legislation targeting social media platforms. Bangladesh is weighing…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events