FB pixel

Overcoming last mile identity management challenges

Overcoming last mile identity management challenges
 

By Steve Lay, Senior Sales Engineer at Strata Identity

Managing identities across an enterprise is a daunting task. A proliferation of users, applications, devices, and clouds introduces formidable barriers to both IT operations and security. Nowhere is the situation more challenging than at last mile access, where authentication butts up against the harsh realities of business — and cybersecurity.

In many cases, the last mile is where frameworks break down, and problems pop up. A mix of proprietary protocols and approaches — different applications often rely on different tools and standards — leads to challenges for network architects, developers, IT groups, security staff, and others. Enforcing policies across legacy and multi-cloud applications can prove tricky and time-consuming.

Fortunately, there’s a way to sidestep the pain caused by last-mile identity challenges. Identity orchestration has the power to abstract identity and policy data from applications without making any code changes while introducing a framework that fully supports all modern identity standards.

This approach typically lowers costs, improves operational efficiency, and boosts security. It also frees software developers and other teams to tackle higher-value tasks.

Lack of standards introduces risk

At the heart of the challenge is a simple fact. A typical enterprise runs hundreds or even thousands of applications. While each software package has authentication and other security protections built in — anything from basic password logins to multi-factor authentication (MFA) or passwordless technology — there’s no uniformity across the stack.

All of this results in a lack of standardization across authentication and authorization mechanisms. Within legacy applications, the result is a lack of support for modern identity protocols such as OAuth, FIDO2, and SAML. In addition, many enterprises struggle to integrate data from individual apps with identity management systems.

In the cloud, the complexities expand further. A diverse and decentralized application ecosystem often leads to varying levels of identity protocol support across cloud providers and inconsistent enforcement of identity policies across cloud apps.

Either way, organizations frequently find themselves addressing tedious tasks, including the need to make modifications to apps, often through direct coding. The problem is especially common for non-standards-based applications including forms that rely on headers, local account authentication (LDAP or database typically), or other proprietary mechanisms.

Again, as all the connection points multiply, particularly in multi-cloud environments — organizations often find themselves struggling to keep up. What’s more, overhead and technical debt continue to accumulate.

Identity orchestration as an instrument for change

Tackling the last mile challenge is paramount. Unifying policy enforcement for hybrid environments is critical. Identity orchestration can rein in the chaos. This abstracted framework — which floats free of all the individual apps and systems — serves as a virtual traffic cop. It supports all modern identity standards and ensures that the right policy is applied at the right place and at the right time.

With this last mile enforcement framework in place, an organization can deploy modern security methods such as MFA or passkeys on a widespread yet granular basis. It can enable and disable accounts based on specific concerns, criteria and events. What’s more, identity orchestration closes many of the entry points that hackers and attackers use to enter a network and do damage.

An enterprise can also adopt standardized identity protocols like OAuth, OpenID Connect and FIDO2 — and even combine and intertwine them in highly strategic ways. This makes it possible to deploy modern technologies more strategically and swap them out universally when newer protocols appear. What’s more, nothing ever touches the actual application.

Getting to Zero

The result is best practice policy enforcement, authentication and access control at enterprise scale — with Zero Trust and least privileged models in place. In addition to the enterprise achieving significant gains, customers, business partners, employees and others all potentially benefit.

With identity orchestration, an organization can unify the management and enforcement of proprietary and incompatible identity policies across both legacy IT and multi-cloud frameworks. Suddenly, the last mile of identity management and authentication becomes more secure and less complicated to administer.

About the author

Steve Lay is Senior Sales Engineer at Strata Identity. He has more than 16 years of customer-facing experience in identity management with SailPoint, Sirius Computer Solutions and IBM.

DISCLAIMER: Biometric Update’s Industry Insights are submitted content. The views expressed in this post are that of the author, and don’t necessarily reflect the views of Biometric Update.

Related Posts

Article Topics

 |   |   |   |   |   |   |   | 

Latest Biometrics News

 

London to introduce permanent live facial recognition cameras

London police have announced their plans to install the UK’s first permanent live facial recognition cameras, catching potential criminals by…

 

UK govt not giving up on Voter ID for 2025 local elections

Removing voter ID from the UK’s elections is not on the table, Minister for Homelessness and Democracy Rushanara Ali confirmed…

 

China strengthening face biometrics regulation to mandate choice, consent

China’s boom in selfie biometrics and facial recognition may already have peaked, with new regulations published so businesses can plan…

 

Intellicheck, Raonsecure invest in new IDV markets for steady growth

Market and investment strategy loom over the latest set of financial results from digital identity and biometrics providers. Intellicheck credits…

 

Facial recognition tender for Toronto police draws interest from major vendors

Eleven biometrics providers, including large international firms, are vying to provide Toronto police with a new facial recognition system, which…

 

OBIM spec enables vendors to build products to interact with DHS biometric system

The U.S. Department of Homeland Security (DHS) has opened its specification for interacting with the nation’s largest biometrics database to…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events