The identity is the key to Entitlement

9:03 PM
The identity is the key to Entitlement -
By Kurt Roemer, Citrix Chief Security Strategist, and Christian Reilly, Citrix CTO for Workspace Services
[1945005IhreIdentität] is so much more than your credentials.

The problem with the notion of identity, it is often limited to its most basic uses. In casual conversations, you say the word identity and people think in predictable directions. Most people think of recognition, identity cards and identity theft. think far too many IT departments automatically with respect to the credentials, logins and IAM (Identity and Access Management). While all these aspects include the identification, identity encompasses so much more. Identity is the key to authorization, access events goes and binds identification consumption.

identity so much more than credentials

A password alone should not be enough to verify the administrator identity and grant access to confidential information - PCI Security standards Council Chief Technology Officer Troy Leach on the introduction of PCI DSS 3.2

identity and proper identification is central to our appreciation of people, roles, Personas and system components. Increasingly, identification is extended to processes, services and bots are acting independently or on our behalf. Identity is to keep the core to a root of trust and in an unbroken chain of trust. Ultimately identity must also integrate directly with the data.

We press and consume multiple identities in our work and personal life that are deeply interconnected, but often completely separate. And the identity of the interoperability and validation problem is even more complicated when we consider the identities that need to be managed over several rollers, projects and relationships.

An evolving view of identity is the key to the context authorization of rights and capabilities for prescribed application and data usage. Dynamic Claims of applications, services and data access allow access, which is specific to the purpose .

access is not only a logon event

access is now also centered way to log events - the only time when identity is verified in most corporate networks. The access, the purpose is specific is built around roles, projects and activities, which are constantly changing, but the need strong identification to ensure only those who are properly authorized, can perform tasks. This is a real challenge, if the identity is managed by independent sources over several companies, application providers, cloud providers and other third-party identity provider. The current response to the management of identities in this context includes IAM (Identity and Access Management), CASB (Cloud Access Security Brokers), brokering and the federal government, which must be supplemented to manage dynamic permissions.

cases use highlighting a claimant view of identity

  1. project-based permissions (complex multi-party identities and relationships): Who is allowed to work on the project ? How can an owner allocate / deallocate resources in organizations? Who worked on the project today? As long as they have it? What data was accessed, updated? together Permissions allows project, task, business and technology teams to manage each their own and their components managed. Non-employee access personally can be verified by providing a basis of identity checked by the contracting company and confirmed by the reputation. A non-employee who leaves the company or a contract situation, roles change or trying a policy violation has identified frustrated quickly and be. Note that this application also applies directly to the use of cloud applications and for fine-grained administrative access controls for highly privileged users.
  1. entitlements for the identity of things : Since the use of technologies and services expanded a network of autonomous things with machine learning, determining are connected by assets, services and relationships will be expanded beyond our current means for managing identity and. The Internet of Things requires applications, services and data identities combined with dynamic credentialing and provisioning of services. As installations and equipment in / out-of-service and service boundaries migrate, claims are expressed and consumed desired behaviors to reflect. These behaviors include privacy management, location-based control systems and other desired aspects of the process and offered claims
  1. Embedded data claims . Today, data access allows full use of the data - and this situation is not always desirable. Excessive access creates undue risk. we do not consider a miscreant who, should access to data because of attack or failure, but the right to view this data or use. identify control access to and use of data by validating and specific permission is required to protect sensitive data that needs to be widely used, such as health data.

identity is the key to authorization

Entitlements offer special privileges for identity-based computing and the activation of the dynamic context access policies

forecasts for the development of the identity and permissions .:

  • the term "identity" is for the company to move to the data and figures in the Internet of things.
  • is used
  • Block Chains, to express and to consume the multiple identities and countless claims in connection with projects and other highly dynamic complex relationships.
  • development of mitigation strategies for the security will lead to data and relationship-specific enclaves. Companies will develop more containers strategies to control data within the managed containers and between federated containers.
  • Information Rights Management will sleep with data level permissions for sensitive data.
  • Multiple identities can be integrated become used to increase confidence between the parties at the same time and at the same time to manage the risks to privacy.
  • is based on reputation obtained identity provider and confidence levels will be verified by a combination of reputational scores, attribution and certificate.
  • expressions of identity allows users and applications to choose their point-in-time role, certain risks and required strength of identification.
  • Embedded identities both of the names of things and the genome of an individual will continue to challenge the privacy, anonymity and identity triad.
  • Federation is an increasingly important role in the automation of the future of identity and claims.

citrix-banner

play
Previous
Next Post »
0 Komentar