FB pixel

Digital identity orchestration providers see IAM upgrade opportunity for organizations

Categories Access Control  |  Biometrics News
Digital identity orchestration providers see IAM upgrade opportunity for organizations
 

Businesses attempting to stitch together software and services to fill distinct but related rolls in digital identity and access management (IAM) are adopting identity orchestration software, but not as quickly as some think they should.

Fragmented identity systems that degrade the user experience, in some cases for employees and in others for consumers, are a common outcome of digital transformation, according to perspectives on identity orchestration offered recently by IBM, Ping Identity and Strata Identity.

A survey from Productiv, published a year ago and cited in a post by IBM, says the average business department uses 87 software-as-a-service (SaaS) apps. Many among this collection of apps will have their own identity systems, and will not easily integrate with each other.

Orchestration platforms integrate disparate digital identity tools and apps into streamlined workflows or “user journeys,” with prebuilt connectors, APIs and protocols like SAML and OAuth. Orchestrated systems are sometimes referred to as “identity fabric.”

“All of a company’s identity tools integrate with the orchestration software, which creates and manages connections between them,” IBM summarizes. “This capability enables the organization to build custom IAM architecture, like vendor-agnostic single sign-on (SSO) systems, without replacing or retooling existing systems.”

IBM shares an example of an employee onboarding workflow, from the initial enrollment in a self-service HR portal to the assignment of privileges and single sign-on (SSO) credentials.

Beyond SSO, IBM notes that digital identity orchestration can help organizations meet compliance requirements, enable smooth functioning across multi-cloud environments and add security measures like multi-factor authentication or passwordless access control to legacy systems.

Organizations that are delaying identity orchestration are leaving money on the table, according to Ping Identity CPO Peter Barker.

Barker writes in a Forbes Council Post that abandoned logins can be reduced and employee productivity improved with identity orchestration. It also allows overworked security teams to more easily manage complex IT environments, and allows administrators to more quickly test and deploy workflows for better operational efficiency.

He also notes that identity orchestration platforms shift the requirements for administration away from coding. Low-code and no-code orchestration platforms have been launched by providers including Ping, Jumio and Trust Stamp, and compete with platforms built through acquisition like those from Incode and Mitek.

Organizations that have invested large amounts of time and effort into building workflows with their legacy identity management systems may find the transition to identity orchestration laborious, however, Barker warns.

A manual for automation

To help organizations navigate this transition, Strata Identity CEO Eric Olden and Content Strategy Lead Heidi King have co-written “Identity Orchestration for Dummies.”

The book frames identity orchestration as the future of IAM, and is intended to help CISOs and digital identity architects adopt orchestration without major investments of time and money.

Strata recently launched an Identity Continuity feature for its orchestration platform.

Related Posts

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

Biometrics back digital government gains around the world

Digital government was in the spotlight this week on Biometric Update with the release of the OECD rankings and a…

 

MOSIP delves into biometric data quality considerations

Biometric data quality was in focus at MOSIP Connect 2026 in Rabat, Morocco, from policies for ensuring good enrollment practices…

 

NIST nominee pressed on AI standards, facial recognition oversight

The Senate Committee on Commerce, Science and Transportation on Thursday considered the nomination of Arvind Raman to serve as Under…

 

Trulioo’s Hal Lonas on how he applies aeronautics principles to fighting fraud

Rocket science is routinely held up as the ultimate example of a highly complex discipline. But Trulioo’s Hal Lonas found…

 

Vouched donates MCP-I framework to Decentralized Identity Foundation

An announcement from Seattle-based Vouched says it has formally donated its Model Context Protocol – Identity (MCP-I) framework to the…

 

California’s OS-based age verification law challenges open-source community

California’s new online safety bill, AB 1043 (the Digital Age Assurance Act), adopts a declared age model for operating systems….

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events