Identity in the Cloud is at its Breaking Point
Published 05/16/2023
Originally published by Strata.
The hardest part of identity and access management (IAM) technology is making it work with multi-vendor infrastructure and the growing number of applications that enterprises rely on to get business done. Primarily because the last-mile integration of applications and identity systems has traditionally been hard coded to allow for the exchange of information about a user, their identity, roles, and access permissions.
How did identity management evolve to where we are today?
In the early days of identity, organizations were required to write bespoke code to integrate apps with identity systems. With the advent of Software as a Service (SaaS) apps, this model was no longer viable because you don’t control the code of the SaaS application. Instead, identity vendors began creating and maintaining connectors to support different apps as needed. This model worked because the app vendors shared the connectors with all their customers, who were happy to no longer have to write their own integration code.
This approach was scalable initially since there were only a dozen or so popularly used SaaS apps. But as these numbers grew, maintaining and testing the app connectors needed to keep them working became problematic. Customers didn’t mind because connectors were managed and delivered by identity systems providers, but increasingly connectors were unable to support apps that didn’t work with identity standards like SAML or OpenID Connect (OIDC).
Connectors are not enough to manage identity in the cloud/multi-cloud era
In the cloud era, connectors are reaching their breaking point. And just as they were created to address an industry pain point, a new model designed to solve the connector impasse has emerged called identity orchestration recipes. This evolutionary approach replaces connectors by eliminating the need for app connectors in the first place. It securely addresses the ‘last mile’ integration with a universal session that works with any app running anywhere, thereby eliminating the need to rewrite apps.
Identity orchestration also enables customers to define use cases in terms of repeatable patterns and templates called recipes. This shifts the focus of work from plumbing to innovation and allows businesses to focus on higher-level concerns like customer experience. This is possible because security is built-in to a plug-and-play integration model that doesn’t require custom code.
Examples of orchestration recipes for user journeys, app modernization, and deploying passwordless authentication
Some use case examples include implementing personalized user journeys, app modernization, deploying passwordless authentication, supporting multiple identity providers (IDP), and more. Each recipe can be applied to hundreds of apps.
Consider LEGO building blocks. Someone with a big enough box of LEGOs can build something amazing – provided they have the time and the skills. For most people, though, it’s far easier to use the pre-designed kit for making a Star Wars Millennium Falcon. You get what you want faster and more easily if everything you need is all right there, and you can assemble it following simple instructions.
Identity orchestration recipes function in much the same fashion and are focused on achieving a desired outcome.
How to use identity orchestration recipes
Implementing orchestration recipes is as simple as browsing a ‘cookbook’ of use case recipes and integrating your identity fabric using a plug-and-play setup. Here are a few simple steps that will get you started:
- Create an inventory of apps, users, and identity systems: What ingredients do you have to work with? Start with an inventory of your systems, then an inventory of your applications. Lastly, make an inventory of your users: Are you talking about customers, employees, partners, or all of the above?
- Connect the ingredients: Once you’ve worked out the systems, applications, and user buckets, then the recipe comes down to how you connect or integrate those three circles of users, apps, and systems (identity providers, authentication, and other tools).
- Implement recipes: Like boiling an egg; this can be as simple or as complex as you want it to be. Most recipes are implemented in hours or days instead of weeks or months.
Recipes don’t need to be convoluted; here are some best practices to keep in mind:
- Focus on the use cases you want to orchestrate: Think of your business use cases and write them down. A whiteboard or a sheet of paper will do. Do you want to modernize apps and identity? Do you need to roll out passwordless MFA? Do you want to streamline user sign-up and sign-on experiences?
- Define the user journey you want for each recipe: The fastest way to build a recipe is to ask: “Users are trying to get to something. What do we want to have happen?” You may notice a flow of orchestration begins to take shape.
- Remember that ingredients in the recipe are interchangeable: Don’t get hung up on how this will work with any particular ingredient (IDP, authentication, app, etc). Recipes allow you to swap out one technology for another; for instance, if you need to change out a legacy SiteMinder system for Azure AD, then simply swap out the identity provider, and the rest of the user flow will continue to work.
- Get buy-in: Use the recipes and their outcomes to get buy-in from business decision-makers and stakeholders by demonstrating the outcomes they can expect. This saves time and money because it’s easier to show the recipe on a whiteboard than build a software demonstration. It’s also really easy to build and demo a quick proof of concept and then scale that out to hundreds of apps once the business is onboard.
In addition, recipes can also be adapted to changing needs as the organization grows. If you have a specific access policy for your employees, you can apply the same recipe across all apps they use without having to do it on a piece-by-piece basis. Apply the recipe to 700 applications, and you’re done; no need to make 700 connectors. Making modifications is just as easy as replacing bourbon with whisky in an Old-Fashioned cocktail.
Like a LEGO kit that will allow you to arrive at your desired outcome faster and more easily, identity orchestration recipes provide a holistic approach to solving complex IAM use case challenges.
Related Articles:
Why Application-Specific Passwords are a Security Risk in Google Workspace
Published: 11/19/2024
Group-Based Permissions and IGA Shortcomings in the Cloud
Published: 11/18/2024
9 Tips to Simplify and Improve Unstructured Data Security
Published: 11/18/2024
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Published: 11/15/2024