Revealing identity management security in the "cloud" how to develop

Source: Internet
Author: User
Keywords Identity Management
The need for identity management-precision and security-is common in cloud service events. According to recent trends, what does it need to look for in their identity management software, from their identity management vendors? Here are four guesses about new points and future developments in identity management. 1. Identity management will even be more united than now the key to the future is to take your identity, make sure it is not just for your network's internal services, but also for extranet and cloud-based applications. As the cloud steals workloads and jobs from the local server, it is increasingly important for who you are to have a sense of portability. How do you synchronize Active Directory identities with Office 365 identities? How do you synchronize your HR identity with your organization's social media presence? How do you make sure that your customer identity in your E-commerce system can be ported to your online forum, your customer support system, your billing, marketing, or promotional practice system? Synchronization and union will be key objects in the coming years. 2. Smart cards and other "possessive" markets will be expanded in many advanced companies and there are already requirements for users to log on to Windows with smart card. This phenomenon will spread. Identity management should be more than just a username and password that is managed on the corporate desktop, it should be something you carry, something that serves someone rather than the two messages that others give you. Workstations or even your standard Enterprise client computers are now so powerful that even complex passwords can be cracked for a certain amount of time, which is still not helpful if many users refuse to give up their easy to remember passwords. Need to add a barrier to a portable object or object to prevent unwanted people who are attempting to access your system, and an additional benefit is the ability to store claims information that can be combined with other systems. This will not be too far in the future by removing the smart card from scratch and moving itself to different environments by inserting it again. 3. Dual authentication will be enforced in many environments for example, in Europe, almost all banks require passwords and hardware portable objects to log on to the online banking port. In the United States, similar double certifications, another great proof of identity, are usually restricted to large enterprises and individuals with high net worth and private bank visits. Double authentication for customers in all environments is almost unheard of. This will change, as smartphones are ubiquitous and mobile apps can perform hardware-portable functions, and the cost of performing dual authentication is significantly reduced. Imagine your users logging on to Windows with a username, their password or PIN, and a one-time password sent directly from your data center to your phone. This is a more secure load. 4. Information control and anonymous control will become important this is a broader point, but it is worth doing. Google has caused uproar when it removed accounts that were not set up with real names from its new Google + service. When your identity becomes easy to carry, it becomes easier to track. And most people are piecing together their activitiesCompanies develop a deep and enduring resistance that they don't understand or agree with. Identity platforms and identity management services need to develop schemas for specified users, and in some cases their administrators control information about a user that is rendered and retained by other networks and services. The internet should keep a place where people can choose to remain anonymous. Similarly, for enterprise users, they should not be forced to choose between easily federated identities and protections and to ease anonymity for basic services. Identity management security issues in short, some of the deeper security tools in the Active Directory Federation Service (ADFS), Federated Identity Management (Federated Identity Manager 2010), and Windows Server 2008 R2 ( such as certification mechanism guarantees and Certificate Services), in the next few years, identity will break free from the current corporate silos. Your users will use an identity for their corporate desktops, cloud services related to your company, or even their leisure activities. No more personality split: the user in the identity of the new era of integration. "Editorial Recommendations" XRI cracked identity management challenges leverage advanced access control and identity management to prevent data theft identity management: Key identity Management Alliance for user security Best Practices self-service Identity management risk: IAM data quality self-service identity management flaw and response endpoint management and identity management: Aggregation Crossroads? " Responsible Editor: Liyan TEL: (010) 68476606 "Original: Revealing identity management security in the" cloud "how to develop return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.