1. IAM Requires a Cloud-First Mindset
Identity management practices in legacy environments are often built out across years of resource additions. They become decentralized and organized around particular on-premises assets. A modernized approach to identity management is to secure and govern identities and access from the cloud. This requires a fundamentally different approach to overall identity architecture.
“A unified and interconnected architecture is the first critical step that enables the success of identity modernization projects,” says Irina Nechaeva, general manager of identity product marketing at Microsoft. “It helps organizations think holistically about all users and all resources, helping define points of consolidation and simplification.”
DIVE DEEPER: IAM’s role is evolving in increasingly complex IT environments.
Most agencies need to secure access to dozens of applications, from third-party Software as a Service tools to on-premises customized resources. It can be overwhelming to figure out where to get started when updating access management for all of these assets.
“A good way to simplify your identity modernization program is to group these applications by the type of authentication protocol, either modern or legacy,” Nechaeva says. “This will inform the new identity architecture and modernization initiative milestones.”
2. Agencies Are Managing Multiple Authentication Protocols
In today’s IT environments, legacy authentication protocols such as Lightweight Directory Access Protocol and Kerberos often sit alongside modern ones, including OAuth 2.0 and Security Assertion Markup Language. This situation requires the creation and management of individual user identities across resources, which can overwhelm IT teams.
One way to get a handle on managing multiple authentication protocols is by using an application gateway. “An application gateway can be used to connect newer systems to legacy applications,” says Wesley Gyure, executive director of product management for security for IBM. “These solutions proxy the flow of traffic and transform the data formats into the new authentication protocols being used to implement single sign-on.”