Four guesses make the cloud identity management more secure

Source: Internet
Author: User
Keywords Cloud security identity management cloud security
Now for 2011 years, our focus has been more on moving things from a corporate position to a cloud floating in the sky. We've seen the zombie network dismantled by the FBI, and we've seen the coming social network. What do all these events have in common? The common point is the need for precise and secure identity management (identity management). According to recent trends, what does it need to look for in their identity software, from their identity vendors? Here are four guesses about new points and future developments in identity management. 1. Identity will even be more united than it is now. The key to the future is to take your identity and make sure it is not just for your network's internal services, but also for extranet and cloud-based applications. As the cloud steals workloads and jobs from the local server, it is increasingly important for who you are to have a sense of portability. How do you synchronize Active Directory identities with Office 365 identities? How do you synchronize your HR identity with your organization's social media presence? How do you make sure that your customer identity in your E-commerce system can be ported to your online forum, your customer support system, your billing, marketing, or promotional practice system? Synchronization and union will be key objects in the coming years. 2. The market for smart cards and other "possessory carriers" will be expanded. In many advanced companies, there are already requirements for users to log on to Windows with smart card. This phenomenon will spread. Identity should not only be a username and password on the corporate desktop, it should be something you carry, something that serves someone rather than just two messages from someone else. Workstations or even your standard Enterprise client computers are now so powerful that even complex passwords can be cracked for a certain amount of time, which is still not helpful if many users refuse to give up their easy to remember passwords. Need to add a barrier to a portable object or object to prevent unwanted people who are attempting to access your system, and an additional benefit is the ability to store claims information that can be combined with other systems. This will not be too far in the future by removing the smart card from scratch and moving itself to different environments by inserting it again. 3. Dual authentication will be enforced in many environments. In Europe, for example, almost all banks need passwords and hardware laptops to log on to the online banking port. In the United States, similar double certifications, another great proof of identity, are usually restricted to large enterprises and individuals with high net worth and private bank visits. Double authentication for customers in all environments is almost unheard of. This will change, as smartphones are ubiquitous and mobile apps can perform hardware-portable functions, and the cost of performing dual authentication is significantly reduced. Imagine your users logging on to Windows with a username, their password or PIN, and a one-time password sent directly from your data center to your phone. This is a more secure load. 4. Information control and anonymityControl will become important. It's a broader point, but it's worth doing. Google has caused uproar when it removed accounts that were not set up with real names from its new Google + service. When your identity becomes easy to carry, it becomes easier to track. And most people develop a deep and enduring resistance to the companies that have pieced together their activities, and they don't understand and disagree. Identity platforms and identity management services need to develop schemas for specified users, and in some cases their administrators control information about a user that is rendered and retained by other networks and services. The internet should keep a place where people can choose to remain anonymous. Similarly, for enterprise users, they should not be forced to choose between easily federated identities and protections and to ease anonymity for basic services. In short, some of the deeper security tools (such as authentication mechanism guarantees and certificate Services) are in the Active Directory Federation Service (ADFS), Federated Identity Manager 2010, and Windows Server 2008 R2. In the next few years, identity will break free from the current corporate silos. Your users will use an identity for their corporate desktops, cloud services related to your company, or even their leisure activities. No more personality split: the user in the identity of the new era of integration. "Editorial recommendations" cloud security challenges the enterprise to cloud services without effective monitoring of attack threats prompted cloud security standards to quickly determine the establishment of cloud security ABC: The cloud of commercial data Security cloud security business information who to protect? It Pros six insights on cloud security definition Cloud Security: Leveraging Grid cloud against application Layer DDoS "responsible editor: Shang Micro TEL: (010) 68476606" Original: Four guess let cloud identity management more secure return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.