{"id":992,"date":"2020-06-09T15:32:19","date_gmt":"2020-06-09T10:02:19","guid":{"rendered":"https:\/\/www.trendstechblog.com\/?p=992"},"modified":"2020-06-09T15:32:40","modified_gmt":"2020-06-09T10:02:40","slug":"focus-on-identity-and-access-management-iam","status":"publish","type":"post","link":"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/","title":{"rendered":"Focus On Identity And Access Management (IAM)"},"content":{"rendered":"<p>IT infrastructures are growing and becoming increasingly heterogeneous. Also, more and more hybrid environments are growing between on-premises solutions and sophisticated cloud-first strategies. Here, data is in the cloud and applications run on-premises or vice versa &#8211; or both. One problem accompanies all three scenarios: whoever is active in the network must be identified without a doubt &#8211; but how.<\/p>\n<p>Against the background of blurring boundaries between on-premises, cloud and hybrid scenarios, more and more questions arise, such as<\/p>\n<p><strong>Where are the limits of the network?<\/strong><\/p>\n<p><strong>Which devices connect to which applications?<\/strong><\/p>\n<p><strong>Who conducts activities out? <\/strong><\/p>\n<p>All of these are questions in the area of digital identity &#8211; and one thing right from the start: Although not only human individuals in the network represent identities, but also devices, applications, websites, and the like, it is not a mistake to start here with humans. If you look at a software stack around the topic of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Identity_management\"><span style=\"color: #0000ff;\"><strong>identity and access management<\/strong><\/span><\/a> (IAM), you should take the perspective for which an IAM platform also stands: namely for the (by no means banal) question of who and what when and why does.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655ddf2153428\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655ddf2153428\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/#Username_And_Password_Are_Any_Credentials\" title=\"Username And Password Are Any Credentials\">Username And Password Are Any Credentials<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/#First_The_Identity_Provider_Is_Controlled_Then_An_Access_Token_Is_Generated\" title=\"First The Identity Provider Is Controlled Then An Access Token Is Generated\">First The Identity Provider Is Controlled Then An Access Token Is Generated<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/#The_Identified_User_Only_Makes_The_Network_Component_Functional\" title=\"The Identified User Only Makes The Network Component Functional\">The Identified User Only Makes The Network Component Functional<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Username_And_Password_Are_Any_Credentials\"><\/span>Username And Password Are Any Credentials<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>People act in many different ways in their digital environments to achieve goals: starting a VPN connection to work remotely, opening a customer account to shop online, and so on. The user cannot do this on his own &#8211; so other digital identities help smartphones, tablets, VPN servers, etc. For these to work properly and to do what the user wants, the identities must \u201cknow\u201d each other, trust each other and beyond any doubt can interact with each other. For example, when it comes to applications that transport sensitive data, process payments, or the like, it is extremely important that only the identified user can act himself &#8211; and not a person who masquerades as this user.<\/p>\n<p>So if a system does not really \u201cknow\u201d a user, but only more or less any \u201ccredentials\u201d such as username and password, the door is open to identity theft &#8211; with all its unforeseeable consequences. Data loss is just as important here as blocking services, injecting malware, and ultimately damaging reputation and customer trust.<\/p>\n<p>Authenticating digital activities through active inputs such as user names and Co. is not identifying. Access is only granted based on an entry &#8211; but anyone who knows this access data could make it. If the classic &#8220;multi-factors&#8221; of authentication are added, the process is moving more towards identification. Two-factor authentication (2FA), which in addition to the access data also asks for a TAN on another device or a physical token, is still not personal. However, if the end device requests a fingerprint to open the TAN or to continue the initiated process, a hard-to-copy, personal factor is included in the access process.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"First_The_Identity_Provider_Is_Controlled_Then_An_Access_Token_Is_Generated\"><\/span>First The Identity Provider Is Controlled Then An Access Token Is Generated<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>But where in humans an iris scan, face recognition, fingerprint, voice recognition, etc. guarantee personal security: what are comparable patterns when it comes to network devices, machines, algorithms, etc.? The IP address alone and possibly typical connection behavior seem to be a relatively thin basis to guarantee real identification that corresponds to that of a human user.<\/p>\n<p>A very helpful connection can be made between human persons, the devices they use, and, for example, the services they call up. The linchpin here is an identity provider that human users control via their devices. This acts as an agent and the requesting device receives an access token. As a result, there is directory access for the individual &#8211; an access manager takes care of corresponding policies, and further access tokens are then tied to this context.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Identified_User_Only_Makes_The_Network_Component_Functional\"><\/span>The Identified User Only Makes The Network Component Functional<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>For illustration, If you look at a restaurant stove with an <a href=\"https:\/\/www.trendstechblog.com\/internet-of-thingsiot-will-working-at-underwater\/\"><span style=\"color: #0000ff;\"><strong>IoT<\/strong> <\/span><\/a>connection, for example, you will find out that the stove itself, of course, does not know the patterns and characteristics of the individual, individual cook who is standing on the appliance. However, if the cook identifies himself via an identity provider, he will receive access tokens to be able to start up the stove at all. The device only starts to function when the user is identified.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Also Read: <a href=\"https:\/\/www.trendstechblog.com\/what-is-a-wisp-wireless-internet-service-provider\/\">What Is A WISP? (Wireless Internet Service Provider)<\/a><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT infrastructures are growing and becoming increasingly heterogeneous. Also, more and more hybrid environments are growing between on-premises solutions and&#8230;<\/p>\n","protected":false},"author":1,"featured_media":993,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[173,174],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Feature Focus On Identity And Access Management (IAM)<\/title>\n<meta name=\"description\" content=\"IT infrastructures are growing and becoming increasingly heterogeneous. Also, more and more hybrid environments are growing between on-premises solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Feature Focus On Identity And Access Management (IAM)\" \/>\n<meta property=\"og:description\" content=\"IT infrastructures are growing and becoming increasingly heterogeneous. Also, more and more hybrid environments are growing between on-premises solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/\" \/>\n<meta property=\"og:site_name\" content=\"Trends Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-09T10:02:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-09T10:02:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Focus-on-Identity-and-Access-Management-IAM-Jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TrendsTechBlog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:site\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TrendsTechBlog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/\"},\"author\":{\"name\":\"TrendsTechBlog\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"headline\":\"Focus On Identity And Access Management (IAM)\",\"datePublished\":\"2020-06-09T10:02:19+00:00\",\"dateModified\":\"2020-06-09T10:02:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/\"},\"wordCount\":719,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"keywords\":[\"IAM\",\"IdentityAccessManagement\"],\"articleSection\":[\"TECHNOLOGY\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/\",\"url\":\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/\",\"name\":\"Feature Focus On Identity And Access Management (IAM)\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#website\"},\"datePublished\":\"2020-06-09T10:02:19+00:00\",\"dateModified\":\"2020-06-09T10:02:40+00:00\",\"description\":\"IT infrastructures are growing and becoming increasingly heterogeneous. Also, more and more hybrid environments are growing between on-premises solutions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trendstechblog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TECHNOLOGY\",\"item\":\"https:\/\/www.trendstechblog.com\/category\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Focus On Identity And Access Management (IAM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trendstechblog.com\/#website\",\"url\":\"https:\/\/www.trendstechblog.com\/\",\"name\":\"Trends Tech Blog\",\"description\":\"Daily Tech Updates\",\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trendstechblog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\",\"name\":\"TrendsTechBlog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"width\":280,\"height\":70,\"caption\":\"TrendsTechBlog\"},\"logo\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\"},\"description\":\"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Feature Focus On Identity And Access Management (IAM)","description":"IT infrastructures are growing and becoming increasingly heterogeneous. Also, more and more hybrid environments are growing between on-premises solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/","og_locale":"en_US","og_type":"article","og_title":"Feature Focus On Identity And Access Management (IAM)","og_description":"IT infrastructures are growing and becoming increasingly heterogeneous. Also, more and more hybrid environments are growing between on-premises solutions.","og_url":"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/","og_site_name":"Trends Tech Blog","article_published_time":"2020-06-09T10:02:19+00:00","article_modified_time":"2020-06-09T10:02:40+00:00","og_image":[{"width":1280,"height":675,"url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Focus-on-Identity-and-Access-Management-IAM-Jpg.jpg","type":"image\/jpeg"}],"author":"TrendsTechBlog","twitter_card":"summary_large_image","twitter_creator":"@trendstechblog","twitter_site":"@trendstechblog","twitter_misc":{"Written by":"TrendsTechBlog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/#article","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/"},"author":{"name":"TrendsTechBlog","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"headline":"Focus On Identity And Access Management (IAM)","datePublished":"2020-06-09T10:02:19+00:00","dateModified":"2020-06-09T10:02:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/"},"wordCount":719,"commentCount":0,"publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"keywords":["IAM","IdentityAccessManagement"],"articleSection":["TECHNOLOGY"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/","url":"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/","name":"Feature Focus On Identity And Access Management (IAM)","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/#website"},"datePublished":"2020-06-09T10:02:19+00:00","dateModified":"2020-06-09T10:02:40+00:00","description":"IT infrastructures are growing and becoming increasingly heterogeneous. Also, more and more hybrid environments are growing between on-premises solutions.","breadcrumb":{"@id":"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trendstechblog.com\/focus-on-identity-and-access-management-iam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trendstechblog.com\/"},{"@type":"ListItem","position":2,"name":"TECHNOLOGY","item":"https:\/\/www.trendstechblog.com\/category\/technology\/"},{"@type":"ListItem","position":3,"name":"Focus On Identity And Access Management (IAM)"}]},{"@type":"WebSite","@id":"https:\/\/www.trendstechblog.com\/#website","url":"https:\/\/www.trendstechblog.com\/","name":"Trends Tech Blog","description":"Daily Tech Updates","publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trendstechblog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1","name":"TrendsTechBlog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/","url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","contentUrl":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","width":280,"height":70,"caption":"TrendsTechBlog"},"logo":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/"},"description":"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News."}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/992"}],"collection":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/comments?post=992"}],"version-history":[{"count":1,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/992\/revisions"}],"predecessor-version":[{"id":994,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/992\/revisions\/994"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media\/993"}],"wp:attachment":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media?parent=992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/categories?post=992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/tags?post=992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}