SlideShare a Scribd company logo
SPINNING NEW THREADS WITH
EXISTING IDENTITY SYSTEMS
2	
  
About iC Consult
FOUNDED IN 1997
120+ EMPLOYEES
OPERATIONS IN 4 COUNTRIES
2 SERVICE BRANDS
Times have changed
3	
  
NowThen
HR
Cloud Use Cases
Shift in the design center
•  High scale & high availability @ low cost
–  Rapid deployment to dozens of environments
–  On-demand change in capacity
–  Multi-tenancy
–  Personalized app presentment on login
–  Data firewall & data sharing
–  Frequent, iterative rollout of features
–  Account creation flows
•  Vetting through private (not corporate) email
•  Device registration on a personal device
•  Password reset with auto-login
•  “Page 2” functionality
•  Multiple personas (i.e., business & consumer)
–  Custom UI for users, admins, and CSR’s 4	
  
Architectures have changed
NowThen
Corp	
  	
  
Data	
  Center	
  
Corp	
  	
  
Pla-orm	
  
Elas1c,	
  Virtualized	
  
Compute	
  Service	
  
PaaS	
  
App’s	
  1	
   2	
   3	
  
•  Always	
  on	
  
•  Unscheduled	
  elas1c	
  compute	
  
•  New	
  features	
  rolled	
  out	
  bi-­‐weekly	
  
•  Very	
  low	
  overhead	
  
Packaged	
  
IDM	
  Products	
  
Out-­‐of-­‐the-­‐box	
  	
  
UI	
   UI’s	
  
…n	
  
Meanwhile, IDM products have changed little
•  Existing products are what they were
•  Core architecture unchanged
•  Standards and practices are evolving
–  But many of the new protocols are “bolted on” to existing architecture
•  Scale, performance requirements outpacing
product improvements
6	
  
So is IDM as we know it out of its league?
7	
  
Current Requirements
IDM Products
Shipping products will never meet contemporary needs
IDM Products:
–  it matters less what you use than how you use it
8	
  
We’ve helped companies solve contemporary problems
with existing technology
•  Multi-tenant LDAP design
–  Product teams were surprised by the approach, but
endorsed it in the end
•  Progressive profile creation
–  From low-barrier to validated accounts
–  Validation UI’s
•  Automated rollout
–  Reduces errors and saves time
–  Iterative feature deployment
•  API-level access controls
9	
  
In Summary…
•  For identity and access products, creative and
destructive processes are ongoing
•  Starting over rarely saves time or effort
•  Use the technologies available to the best of their
abilities
IAM EXCELLENCE
iC Consult Americas LLC
222 S. Main Street, Suite 500
Salt Lake City, UT 84101
E-Mail: contact@icconsult.com
www.icconsult.com

More Related Content

PDF
#MFSummit2016 Operate: Introduction to software collaboration and networking
PDF
#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...
PPT
App softwares
PDF
#MFSummit2016 Operate: Towards a unified endpoint management strategy
PDF
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
PPTX
Unraveling the mystery of Cloud Computing
PDF
#MFSummit2016 Operate: The race for space
#MFSummit2016 Operate: Introduction to software collaboration and networking
#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...
App softwares
#MFSummit2016 Operate: Towards a unified endpoint management strategy
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
Unraveling the mystery of Cloud Computing
#MFSummit2016 Operate: The race for space

What's hot (20)

PPTX
Shield Watch IT & Web Services - Cloud Desktop Online
PPTX
Codestone Cloud in a Box Overview
PPTX
InvisibleCRM Gold Partner Program
PPTX
Design Like a Pro: Machine Learning Basics
PPTX
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
PDF
Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...
PDF
Building on quicksand microservices indicthreads
PDF
SOLIDWORKS Enterprise PDM Data Sheet
PPT
Application Software
PPTX
Using the Cloud to Deploy Quality Management Software
PDF
Enterprise Content Management 101 for the Hospitality Industry
PPTX
What's New in PHD Virtual ReliableDR v3.3
PDF
Ultra-scale e-Commerce Transaction Services with Lean Middleware
PDF
Alfresco Day Roma 2015: Alfresco One
PPTX
Infrastructure for SaaS Applications
PDF
200% Increment in Server Availability for the Client in 6 Months - Fingent C...
PPTX
Romi tech cloud workspace overview
PPT
Fostering innovation through agile Government ICT
PDF
Introducing the Latest in High Availability from Syncsort
PPTX
Hosted Virtual Desktops and Streamed Applications
Shield Watch IT & Web Services - Cloud Desktop Online
Codestone Cloud in a Box Overview
InvisibleCRM Gold Partner Program
Design Like a Pro: Machine Learning Basics
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...
Building on quicksand microservices indicthreads
SOLIDWORKS Enterprise PDM Data Sheet
Application Software
Using the Cloud to Deploy Quality Management Software
Enterprise Content Management 101 for the Hospitality Industry
What's New in PHD Virtual ReliableDR v3.3
Ultra-scale e-Commerce Transaction Services with Lean Middleware
Alfresco Day Roma 2015: Alfresco One
Infrastructure for SaaS Applications
200% Increment in Server Availability for the Client in 6 Months - Fingent C...
Romi tech cloud workspace overview
Fostering innovation through agile Government ICT
Introducing the Latest in High Availability from Syncsort
Hosted Virtual Desktops and Streamed Applications
Ad

Viewers also liked (19)

PDF
CIS14: Authorization: It's What's for Dessert
PDF
CIS14: Identity at Scale: Building from the Ground Up
PDF
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
PDF
CIS13: Identity Tech Overview: Less Pain, More Gain
PDF
CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the Sta...
PDF
CIS14: Handling Identity in AllJoyn 14.06
PDF
CIS14: NSTIC: Identity Enables a New Digital Relationship
PDF
2014 07-19 id cloud summit
PDF
CIS14: Bringing Crypto Back: Web Authentication without Bearer Tokens
PDF
CIS14: PingOne IDaaS: What You Need to Know
PDF
CIS14: Authentication: Who are You? You are What You Eat
PDF
CIS14: Best Practices You Must Apply to Secure Your APIs
PDF
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
PDF
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
PDF
CIS13: APIs, Identity, and Securing the Enterprise
PDF
CIS14: Early Peek at PingFederate Administrative REST API
PDF
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
PDF
CIS14: Physical and Logical Access Control Convergence
PDF
CIS13: Is Identity the Answer to the Great Question of Life, the Universe, an...
CIS14: Authorization: It's What's for Dessert
CIS14: Identity at Scale: Building from the Ground Up
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS13: Identity Tech Overview: Less Pain, More Gain
CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the Sta...
CIS14: Handling Identity in AllJoyn 14.06
CIS14: NSTIC: Identity Enables a New Digital Relationship
2014 07-19 id cloud summit
CIS14: Bringing Crypto Back: Web Authentication without Bearer Tokens
CIS14: PingOne IDaaS: What You Need to Know
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Best Practices You Must Apply to Secure Your APIs
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS13: APIs, Identity, and Securing the Enterprise
CIS14: Early Peek at PingFederate Administrative REST API
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: Physical and Logical Access Control Convergence
CIS13: Is Identity the Answer to the Great Question of Life, the Universe, an...
Ad

Similar to CIS14: Spinning New Threads with Existing Identity Systems (20)

PPTX
Customer Presentation
PDF
2013-06-04 Best in Class Cloud Based Accounting Systems
PDF
Discover - Innovating With Speed and Agility
PPTX
2013-11-13 Cloud Based Accounting Systems
PDF
04 Ace 2010 Mi Tek Aras Plm Open User Deployment
PDF
Securing the Cloud Native Stack
PDF
2015-01-14 Best of Breed Cloud Based Accounting System
PPTX
DevOps Days Ohio
PPTX
Patching is Your Friend in the New World Order of EPM and ERP Cloud
PDF
Securing the Cloud Native stack
PPTX
2014-03-26 Best in Cloud Based Accounting Systems
PPTX
2014-06-12 Intacct Cloud Based Accounting System Seminar
PDF
Tech strategies keynote final for dc
PDF
2014-09-23 Best of Breed Cloud Based Accounting System Seminar
PPTX
Disruptive Trends in Application Development
PDF
Fishbowl Solutions Webinar: A Path, Package, and Promise for WebCenter Conten...
PPTX
Patterns and Antipatterns for Adopting IBM DevOps Tools
PDF
Continuous Delivery at Wix, Yaniv Even Haim
PDF
Transforming Enterprises through Next-generation Cloud Applications
PPTX
SplunkLive! Austin Customer Presentation - Dell
Customer Presentation
2013-06-04 Best in Class Cloud Based Accounting Systems
Discover - Innovating With Speed and Agility
2013-11-13 Cloud Based Accounting Systems
04 Ace 2010 Mi Tek Aras Plm Open User Deployment
Securing the Cloud Native Stack
2015-01-14 Best of Breed Cloud Based Accounting System
DevOps Days Ohio
Patching is Your Friend in the New World Order of EPM and ERP Cloud
Securing the Cloud Native stack
2014-03-26 Best in Cloud Based Accounting Systems
2014-06-12 Intacct Cloud Based Accounting System Seminar
Tech strategies keynote final for dc
2014-09-23 Best of Breed Cloud Based Accounting System Seminar
Disruptive Trends in Application Development
Fishbowl Solutions Webinar: A Path, Package, and Promise for WebCenter Conten...
Patterns and Antipatterns for Adopting IBM DevOps Tools
Continuous Delivery at Wix, Yaniv Even Haim
Transforming Enterprises through Next-generation Cloud Applications
SplunkLive! Austin Customer Presentation - Dell

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Electronic commerce courselecture one. Pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Mobile App Security Testing_ A Comprehensive Guide.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Agricultural_Statistics_at_a_Glance_2022_0.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25 Week I
Advanced methodologies resolving dimensionality complications for autism neur...
sap open course for s4hana steps from ECC to s4
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Electronic commerce courselecture one. Pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

CIS14: Spinning New Threads with Existing Identity Systems

  • 1. SPINNING NEW THREADS WITH EXISTING IDENTITY SYSTEMS
  • 2. 2   About iC Consult FOUNDED IN 1997 120+ EMPLOYEES OPERATIONS IN 4 COUNTRIES 2 SERVICE BRANDS
  • 3. Times have changed 3   NowThen HR
  • 4. Cloud Use Cases Shift in the design center •  High scale & high availability @ low cost –  Rapid deployment to dozens of environments –  On-demand change in capacity –  Multi-tenancy –  Personalized app presentment on login –  Data firewall & data sharing –  Frequent, iterative rollout of features –  Account creation flows •  Vetting through private (not corporate) email •  Device registration on a personal device •  Password reset with auto-login •  “Page 2” functionality •  Multiple personas (i.e., business & consumer) –  Custom UI for users, admins, and CSR’s 4  
  • 5. Architectures have changed NowThen Corp     Data  Center   Corp     Pla-orm   Elas1c,  Virtualized   Compute  Service   PaaS   App’s  1   2   3   •  Always  on   •  Unscheduled  elas1c  compute   •  New  features  rolled  out  bi-­‐weekly   •  Very  low  overhead   Packaged   IDM  Products   Out-­‐of-­‐the-­‐box     UI   UI’s   …n  
  • 6. Meanwhile, IDM products have changed little •  Existing products are what they were •  Core architecture unchanged •  Standards and practices are evolving –  But many of the new protocols are “bolted on” to existing architecture •  Scale, performance requirements outpacing product improvements 6  
  • 7. So is IDM as we know it out of its league? 7   Current Requirements IDM Products
  • 8. Shipping products will never meet contemporary needs IDM Products: –  it matters less what you use than how you use it 8  
  • 9. We’ve helped companies solve contemporary problems with existing technology •  Multi-tenant LDAP design –  Product teams were surprised by the approach, but endorsed it in the end •  Progressive profile creation –  From low-barrier to validated accounts –  Validation UI’s •  Automated rollout –  Reduces errors and saves time –  Iterative feature deployment •  API-level access controls 9  
  • 10. In Summary… •  For identity and access products, creative and destructive processes are ongoing •  Starting over rarely saves time or effort •  Use the technologies available to the best of their abilities
  • 11. IAM EXCELLENCE iC Consult Americas LLC 222 S. Main Street, Suite 500 Salt Lake City, UT 84101 E-Mail: contact@icconsult.com www.icconsult.com