Identity Relationship Management



Similar documents
Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

The Rise of the Social Enterprise

DESKTOP VIRTUALIZATION

Start Measuring What Matters

Effectiveness vs. Efficiency: Embracing the New Customer Experience Paradigm

The Next Generation Learning Management System

Adopting ITIL Framework By Vinayak Ghadi

Network Packet Monitoring Optimizations in Data Centre

Enterprise Gamification

Unified Communications Solution on Communication Enabled Business Process

WHITEPAPER Improving the Quality of Government Services with Citizen-Focused Identity Management

Identity as a Revenue Generator:

Six Steps to Private Cloud Adoption

The Next Generation Mobile Marketing Ecosystem: Beyond SMS Ads to Customer Insights and Offers

Cloud A view on why it s still overcast in CIOs minds

Enabling Enterprise to Implement Mobility Strategy Using an Unorthodox Approach

Data Visualization & Reporting for Case Management

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

WAN Migration Techniques

Helping Healthcare Organizations to Build Digital Businesses

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

People-Focused Access Management. Software Consulting Support Services

Open Identity Stack. Forging a New Future with Identity Relationship Management

CA Technologies Strategy and Vision for Cloud Identity and Access Management

A new era for the Life Sciences industry

WHITEPAPER OpenIDM. Identity lifecycle management for users, devices, & things

GOVERNMENT USE OF MOBILE TECHNOLOGY

Identity Management. Presented by Richard Brown. November November MILCIS IdM

The Primer: Nuts and Bolts of Federated Identity Management

HOW TO TURN 9 RETAIL IT CHALLENGES INTO 9 BUSINESS OPPORTUNITIES

Online Identity Attribute Exchange Initiatives

SUPERVALU Successfully Leverages Tablet Technology and Identity and Access Management Infrastructure for Increased Security and Business Productivity

vision realize your software-defined with the Digital Data Center from Atos Whitepaper

HYBRID CLOUD SERVICES HYBRID CLOUD

Know Your Buyer: A predictive approach to understand online buyers behavior By Sandip Pal Happiest Minds, Analytics Practice

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

RETAIL MOVING ON CLOUD

A CIO s Guide To Mobility Management

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

How To Get A Better At Developing An Application

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR OPTIMIZING BUSINESS PROCESS MANAGEMENT IN GOVERNMENT

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

Unified Communications-as-a-Service (UCaaS) for Video Conferencing

The organization decided that creating a more robust approach to customerfacing identity management represented a strategic opportunity.

The Evolution of the Service Desk: White Paper

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

CIO 100 SYMPOSIUM: WORKPLACE OF THE FUTURE

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

The Order Management Tipping Point:

Rootstock Software White Paper How Cloud Computing is Changing the Manufacturing ERP Landscape

RSA Identity and Access Management 2014

The Identity Defined Security Alliance

Evolution of the Software Defined Data Center

Telecoms: Migration to the Cloud?

The Order Management tipping point. Why Salesforce is at the center of the new Communication Service Provider architecture

!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by

Glinda Cummings World Wide Tivoli Security Product Manager

The Progress Vision Your Reality. Karen Tegan Padir Chief Technology Officer

liberate unify and secure your enterprise communications A3C Anytime Communication & Collaboration Cloud

Workspace Aggregation

White paper Reaping Business Value from a Hybrid Cloud Strategy

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center

Market Maturity. Cloud Definitions

The Digital Business Era Is Here

Regional Grocers Gain a Fast, Differentiating Competitive Edge with SaaS

The cloud - ULTIMATE GAME CHANGER ===========================================

Unlock the Promise of Cloud: A Strategic Perspective

Embracing SaaS: A Blueprint for IT Success

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

TRENDS DISRUPTING Enterprise Content Management. Why Legacy ECM Systems Are Being Left Behind And A New Approach Is Needed

WHITEPAPER ForgeRock Identity Management. Identity lifecycle management for users, devices, and things

Digital Disruption & the Digital Media Supply Chain

Elastic Private Clouds

Security in the App Economy

G Cloud 6 CDG Service Definition for Forgerock Software Services

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

At the Heart of Digital-Ready Business

Cloud Computing and Business Intelligence

Mobility and cloud transform access and delivery of apps, desktops and data

Developing a business model for Identity Management. Dr. Hellmuth Broda, VP Business Development, First Ondemand Spokesperson, Liberty Alliance

locuz.com Identity and Access Management Practice

Powerful analytics. and enterprise security. in a single platform. microstrategy.com 1

At the Heart of Virtualizing Insurance

Cloud Executive Perspective January 2015 CLOUD EXECUTIVE PERSPECTIVE. Cloud Computing. Changing the Role and Relevance of IT Teams.

CIO & Enterprise Architect s Guide To Using SaaS To Cut IT Costs

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM)

Agile Cloud-Enabled Services (ACES)

5 WAYS STRUCTURED ARCHIVING DELIVERS ENTERPRISE ADVANTAGE

Enabling HR service delivery

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

BATTLING IT OUT: APPLICATION AND MOBILE SECURITY

The Evolution of Manufacturing Software Platforms: Past, Present, and Future

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

managing SSO with shared credentials

OneLogin 2014 State of SaaS Identity Management

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,

5 Things to Look for in a Cloud Provider When it Comes to Security

Transcription:

November 2013 Identity Relationship Management

Identity Relationship Management Identity Relationship Management Kantara Initiative, Believers of the World Unite. The Internet of Things is completely redefining how user identities are delivered to applications, devices, and things. The shift from Identity and Access Management to Identity Relationship Management is about shifting from the classic 'castle defense' to identity as business enabler" - Joni Brennan, Executive Director, Kantara Initiative. Background Identity and Access Management (IAM) is a comprehensive model for managing a company s interactions with current and future customers. IAM rapidly and cost effectively unleashes new business opportunities that drive next generation consumerfacing services and top line revenues. Traditional identity and access management (IAM) services were built for an organization s internal use, and controlling access to data and systems behind the firewall. However with businesses looking for increased engagement with customers, the number of people and devices that require access to sensitive information is growing rapidly. Organizations can support this change by evolving their IAM systems, which will help build value for these companies by providing efficient and secure customer as well as partner-facing services. Legacy identity platforms were designed to solve a completely different problem securing employee and partner identities behind the firewall. IRM platform is designed to help CIOs address these new business challenges at Internet Scale. As increasing numbers of people, devices, and things are assigned identities across networks, simple, flexible, and scalable identity and access management services become imperative for any business to safely and efficiently engage with their customers. Today s solutions must link devices--laptops, phones, touchpads, cars--and new mobile and social apps into a single security platform that works all the time, everywhere, on premises or off in the cloud. IAM is no longer merely identity and access management--it s IRM: identity relationship management. Successful CIOs will shift their business values to embrace this new reality Kantara Initiative Kantara Initiative is an open focal point for collaboration to address the issues of the identity community. Kantara activities focus on requirement gathering for the development and operation of Trust Frameworks as well verification of actors within Trust Framework ecosystems. Kantara Initiative accredits Assessors, approves Credential Service Providers Services and recognizes Service Components (Identity Proofing and Credential Management). Mission: To foster identity community harmonization, interoperability, innovation, and broad adoption through the development criteria for operational trust frameworks and deployment/usage best practices for privacy-respecting, secure access to trusted online services.

Vision: Ensure secure, identity-based, online interactions while preventing misuse of personal information so that networks can be transformed in trustworthy environments with better privacy protection. Goals: Accelerate marketplace adoption through clear messages, defined processes, and open community collaboration that brings vendors, deployers, individuals, and organizations together Bring together technical, business, legal, and policy experience to achieve holistic and trusted identity management solutions Establish an open and democratic governance model with no financial barrier to participation Implement an operational structure with nimble processes, well defined procedures, and responsible oversight, and a viable financial model Commit to open standards and encourage interoperable implementations from both the COTS product and open source development communities Foster positive dialogue across all relevant organizations to assure coordination, harmonization, and re-use of all applicable open content (specs, policy, etc.) Establish programs with strong branding for technical and operational output to promote interoperability, compliance and/or conformance Evolution of Identity IRM fosters the concept of relationships being more valued than a strongly proofed identity. (Strongly proofed identity certainly has a highly valuable role, where necessary, but in everyday cases it s often the relationship that is the key to success not the identity.)

Business Pillars of IRM As consumers look for and expect more ways to engage with businesses, companies are making the shift from the closed, protective world of IAM to the open, evolving, and confidently secure IRM universe. Over the course of time, companies have realized that identity and access management tools are a necessity for managing trust relationships with parties inside and outside of a company relationships that are now tied directly to the business s top line. This shift in business emphasis has had a direct technical impact on how identity and access management is perceived. As a result, in near future IRM solution would need to be chosen after taking into account following business-focused pillars: CONSUMERS AND THINGS over employees Traditional IAM platforms were designed for on-premises employees use and are unable to provide the quick, secure, and device-flexible IAM experience customers are looking for. Modern identity management must manage access privileges for all stakeholders across a variety of devices. ADAPTABLE over predictable Unlike traditional IAM designed for specific static events, IRM must understand contextual circumstances. For example, even when users log in from a different device or location, they should still have the access to the information they need. TOP LINE REVENUE over operating expense IAM has always been viewed as a necessity for employees and therefore a business cost. In today s world, the security system is used to authenticate and authorize both consumers and employees. If an IRM solution is efficient, secure, and accurate, it can directly contribute to a business top line revenue, as customers will have easy access to secure applications where they can buy services. VELOCITY over process IAM has migrated from being a business cost to being the business driver. Companies suffer materially if their IAM solution takes too long to deploy, adapt, or respond to user events. Employees may put up with slow IAM systems, but customers don t and won t. Modern IRM serving employees, customers, and devices must instantly react to variable circumstances and events, and must be massively scalable and instantly available so that no user ever waits around or worse, is shut out. CIOs today make IRM decisions based on speed, ease of use, and the ability to scale to handle customer volume not based on implementation and cost of deployment.

Technical Pillars of IRM The shift to cloud, social, mobile, and SaaS is revolutionizing the enterprise, and IAM needs to evolve to help businesses capture new opportunities without worrying about the associated complexities that are a result of this change. This shift in business emphasis has a direct technical impact on how we perceive identity and access management. Through this shift we have come to value the following technical pillars: INTERNET SCALE over enterprise scale Today s users access secure systems not just on premises, but in the cloud and via the internet, any time, day or night. Modern day users are not just employees logging on at work but also partners, customers, using multiple devices to sign in from anywhere. As the number of users grows exponentially, modern IRM systems must be able to accommodate hundreds, thousands, or even millions of additional identities instantaneously, achieving a scalable volume that was neither possible nor needed for the enterprise, but is essential in an internet-connected, consumer-facing world. DYNAMIC INTELLIGENCE over static intelligence Traditional IAM was designed for a specific set of events employee on and off-boarding, for example, taking place in a predictable on premises work environment. Today s IRM must understand the circumstances in order to determine whether or not you get access, and if so, how much and to what extent? If you log in from a new device or from a different country, for example, a modern, adaptable IRM system will have to adjust to the uncertain circumstances and ask you for additional authentication beyond a simple password. BORDERLESS over perimeter Once upon a time, employees arrived at the office, logged into secure systems and logged back off at the end of the day. In today s work-from-anywhere culture, employees, as well as partners and customers need access from their laptops, phones, tablets and even cars. They access secure data stored not only on company premises, but also in the cloud and hosted by SaaS providers. MODULAR over monolithic Today s IRM demands are much more complex than those of traditional IAM. A good IRM solution is designed from the ground up as an integrated, cohesive stack that is purposebuilt to handle complexity. Traditional IAM typically built in fragments through acquisitions and tacking on parts as needs arise, struggles to respond to the multitude of users, circumstances, devices, access points, and access privileges that dominate today s IRM world. IRM Requirements The table below summarizes some of these emerging IRM platform requirements as well as still-relevant traditional IAM requirements

REQUIREMENTS Enterprise IAM IRM SCALE Millions Millions USER TYPES Employees Customers, partners and Employees CLIENTS Desktops, laptops Mobile phones, tablets, anything with IP address NETWORKS Single on-premises network Multiple - cloud, SaaS & onpremises network ARCHITECTURE STYLE SOAP REST STANDARDS PROVISIONING, PROOFING, SELF-SERVICE SPML SCIM AUTHENTICATION, SESSION SAML OpenID Connect MANAGEMENT SSO, FEDERATION XACML XACML OAuth, UMA AUTHORIZATION, CONSENT, ACCESS CONTROL Millions Customers Founding Signatories The founding Signatories are Philippe de Raet (Experian) Pat Patterson (Salesforce.com) Allan Foster (ForgeRock) Joni Brennan (Kantara Initiative) Benefits Provides agile identity at internet scale IRM platform allows organizations to generate applications and bring services to market faster and with more flexibility, driving top-line revenue growth. References http://kantarainitiative.org/irmpillars/ http://kantarainitiative.org/irmaction/

About Happiest Minds Happiest Minds is a next-generation IT services company helping clients differentiate and win with a unique blend of innovative solutions and services based on the core technology pillars of cloud computing, social computing, mobility and analytics. We combine an unparalleled experience, comprehensive capabilities in the following industries: Retail, Media, CPG, Manufacturing, Banking and Financial services, Travel and Hospitality and Hi-Tech with pragmatic, forward-thinking advisory capabilities for the world s top businesses, governments and organizations. Founded in 2011, Happiest Minds is privately held with headquarters in Bangalore, India and offices in the USA and UK. Corporate Office Happiest Minds Technologies Pvt. Ltd. Block II, Velankani Tech Park 43 Electronics City Hosur Road, Bangalore 560100, INDIA Phone: +91 80 332 03333 Fax: +91 80 332 03000 United States 116 Village Boulevard, Suite 200 Princeton, New Jersey, 08540 Phone:+1 609 951 2296 United Kingdom 200 Brook Drive, Green Park, Reading Berkshire, RG2 6UB Phone: +44 11892 56072 Fax: + 44 11892 56073