SlideShare a Scribd company logo
Identity and Access Management in the
Era of Digital Transformation
Selvaratnam Uthaiyashankar
VP – Engineering
WSO2
Identity and Digital Business
• Identity is at the heart of
Digital Business
Image source: http://coranet.com/images/network-security.png
Identity Centric
• Digital Business is all about “User”
– How do we know who is accessing
– Things user can access or do
– User’s preferences
– Rules User has to adhere
– Relationship with other entities
Proper identity enforcement is essential for
customer experience, security, privacy
Authentication
• Direct Authentication
– Basic Authentication
– Digest Authentication
– TLS Mutual Authentication
Service Providers
Authentication
Service Consumption
Image Source : http://www.densodynamics.com/wp-content/uploads/2016/01/gandalf.jpg
Digital business requires seamless integration of
various systems…
Identity Challenges When Integrating Multiple Systems
• Different username, password (credential) for different
systems
– Preferred username is already taken
– Using same username/password might become a security risk
• Too many username, password
• Loosing possible collaborations between applications
Authentication
• Brokered Authentication
– SAML
– OAuth : SAML2/JWT grant type
– OpenID
– OpenID Connect
• Single Sign-On
Service Providers
Service Providers
Service Providers
Identity Provider
Service Providers
Authentication
Service Consumption
Trust
Image source: http://savepic.ru/6463149.gif
Users Might Want to Use Their Social Identities
• BYOID
Users Might Want to Use Their Enterprise Identity
• Trust between different Identity Domains
• Identity Federation
Service Providers
Service Providers
Service Providers
Identity Provider B
Service Providers
Authentication
Service Consumption
Trust
Identity Provider A Trust
Multi-option Authentication
Identity Bus
Identity links all the systems. You just increased the
risk of attack on your identity…
Often, weak link is poor user credential
https://www.infosecurity-magazine.com/news/compromised-credentials-quarter/
Multi Factor Authentication
• What you know
• What you have
• What you are
Image source: http://it.miami.edu/_assets/images/multifactor1.png
Adaptive Authentication
• Ability to change authentication options based on the context
https://3c1703fe8d.site.internapcdn.net/newman/gfx/news/hires/2013/howdochamele.jpg
Provisioning Users
• Self Service
– Complete user management
– User Portal
• Approvals and Workflows
• Just In Time Provisioning
http://blog.genesys.com/wp-content/uploads/2014/07/Road-Sign-Self-Service.jpg
Provisioning Users in Multiple Systems
Access Control
• Principle of least privilege
• Role based access control
• Attribute based access control
• Fine-grained access control
with XACML
http://findbiometrics.com/assets/iStock_Access-300x225.jpg
Auditing User Activities
• You might not know who will access
your system (BYOID)
• Full Audit on user activities are
important
– Specially on User Management, Admin
operations
– Who, What, From Where, When, How
• Accountability, Reconstruction, Problem
Detection, Intrusion Detection
http://cdn.gocertify.com/images/Auditing%20team%20going%20over%20report.jpg
Analytics
• Understanding user behavior
• Predicting future needs
• Fraud detection
http://www.labrechedigital.com/images/analytics.png
API Security
• APIs are powering the Digital Business
• Ability to secure the API (OAuth)
• Identity delegation
https://edinversity.files.wordpress.com/2013/07/handing-over-car-keys.jpg
IoT is an Essential Element in Digital Business
• Identity Include “Things”
• Securing your IoT devices is a must
• Consider scalability of your IAM System
https://media.licdn.com/mpr/mpr/shrinknp_400_400/AAEAAQAAAAAAAAWRAAAAJDkwODMwYzIyLTA5MzktNDAwZi05ZmI4LWJkYT
AyM2U4MDBlNQ.jpg
Perimeter of Your Digital Business will Increase
• Data is in cloud, mobile devices
• Borders across systems don’t work anymore
• Your Attack Surface increases
– you can’t remove unused features in the cloud services
• Security by obscurity doesn’t work anymore
• Expect hacking, DoS attacks, phishing attack
• Controlling access, monitoring, analyzing and predicting attacks
are the way forward
Bridging Cloud and Internal Systems
• Connectors to bridge Cloud Systems
and Internal Systems
– Might not be able to open ports for
outside world
http://www.stratoscale.com/wp-content/uploads/gap-1080x1080.jpg
Digital Business Requires Agility
• Should be able to connect new systems
easily
• Frequent changes to external system
• Future Proof
• Needs some Identity Mediation
Concepts
http://s3-us-west-2.amazonaws.com/abacus-blog/wp-content/uploads/2015/10/dog-agility.png
Digital Business Encourages Innovation
• Often, security strategy is viewed as restrictive for Innovation
– Specially, when involving with public services, APIs
• Security should be transparent to the user for better user
experience
https://www.gatesnotes.com/~/media/Images/Articles/About-Bill-Gates/Accelerating-
Innovation/innovation_2016_article_1200px_v1.jpg
Digital Transformation Requires Cultural Changes
• More and more, business units
are in control rather than IT and
security teams
– Yet you need to know who is
accessing, what they are
accessing, etc.
• Understanding this cultural shift
will reduce frustrations
http://www.leehopkins.net/wp-content/uploads/2010/11/iStock_000010822711XSmall_thumb.jpg
WSO2 Identity Server
Identity and Access Management in the Era of Digital Transformation
http://cdn.ttgtmedia.com/rms/security/Gartner2014_ASA.jpg
Thank You!

More Related Content

PPTX
Reinforcing Your Enterprise With Security Architectures
PPTX
Planning Your Cloud Strategy
PPTX
Federated and fabulous identity
PPTX
IoT mobile app device cloud identity and security architecture
PPTX
IAM Cloud
PPTX
The lazy programmer`s way to secure application
PDF
IT-Security@Contemporary Life
PPTX
Identity and Security in the Cloud
Reinforcing Your Enterprise With Security Architectures
Planning Your Cloud Strategy
Federated and fabulous identity
IoT mobile app device cloud identity and security architecture
IAM Cloud
The lazy programmer`s way to secure application
IT-Security@Contemporary Life
Identity and Security in the Cloud

What's hot (20)

PPTX
Core defense mechanisms against security attacks on web applications
PPTX
The Path to IAM Maturity
PPTX
CyberArk Online Training By Expert Trainer - itjobzone
PDF
Solving problems with authentication
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
PDF
SailPoint - IdentityNow Identity Governance
PPT
Authentication Technologies
PDF
20150528_ficha SECURIS
PDF
Security Patterns with the WSO2 ESB
PDF
Understanding Claim based Authentication
PPTX
Web authentication & authorization
PPTX
Securing Access Through a Multi-Purpose Credential and Digital ID
PDF
Enterprise Collaboration - 4
PPTX
Computer security
PPTX
Azure active directory
PPTX
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
PDF
Claim based authentaication
PDF
Uma webinar 2014 03-20
PDF
Denver ISSA Chapter Meetings - Changing the Security Paradigm
PPTX
Identity and Access Management Introduction
Core defense mechanisms against security attacks on web applications
The Path to IAM Maturity
CyberArk Online Training By Expert Trainer - itjobzone
Solving problems with authentication
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
SailPoint - IdentityNow Identity Governance
Authentication Technologies
20150528_ficha SECURIS
Security Patterns with the WSO2 ESB
Understanding Claim based Authentication
Web authentication & authorization
Securing Access Through a Multi-Purpose Credential and Digital ID
Enterprise Collaboration - 4
Computer security
Azure active directory
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
Claim based authentaication
Uma webinar 2014 03-20
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Identity and Access Management Introduction
Ad

Viewers also liked (20)

PPTX
Identity and Access Management - RSA 2017 Security Foundations Seminar
PDF
CIS14: Are the Enterprises Ready for Identity of Everything?
PDF
CIS14: Developing with OAuth and OIDC Connect
PDF
WSO2Con 2013 - WSO2 as a Crypto Platform
PDF
OAuth 2.0 Token Exchange: An STS for the REST of Us
PDF
Knowledge Management and Communication Opportunities in Peace Support Operations
PPT
Integrated Marketing Communication Campaign
PDF
Collaboration strategy how-to
PDF
Towards unified knowledge management platform (rulefest 2010)
PPT
Web-based Business Marketing
PPTX
Knowledge Management for Real
PPT
Knowledge Production and Dissemination in the Digital Era
PPT
If You Tag it, Will They Come? Metadata Quality and Repository Management
PDF
Knowledge management in the social era
PPTX
Knowledge management and knowledge workers in the digital era challenges and...
PDF
Tara Knapp: From Conceptual Knowledge to Real World Implementation
PPTX
Knowledge Management and Communication
PPTX
Achieving Impact Through Knowledge Management and Communication in the Hindu ...
PDF
Web-based business models in 2015
Identity and Access Management - RSA 2017 Security Foundations Seminar
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Developing with OAuth and OIDC Connect
WSO2Con 2013 - WSO2 as a Crypto Platform
OAuth 2.0 Token Exchange: An STS for the REST of Us
Knowledge Management and Communication Opportunities in Peace Support Operations
Integrated Marketing Communication Campaign
Collaboration strategy how-to
Towards unified knowledge management platform (rulefest 2010)
Web-based Business Marketing
Knowledge Management for Real
Knowledge Production and Dissemination in the Digital Era
If You Tag it, Will They Come? Metadata Quality and Repository Management
Knowledge management in the social era
Knowledge management and knowledge workers in the digital era challenges and...
Tara Knapp: From Conceptual Knowledge to Real World Implementation
Knowledge Management and Communication
Achieving Impact Through Knowledge Management and Communication in the Hindu ...
Web-based business models in 2015
Ad

Similar to Identity and Access Management in the Era of Digital Transformation (20)

PDF
Compliance & Identity access management
PDF
Why IAM is the Need of the Hour
PDF
Remote Access Policy Is A Normal Thing
PDF
Future-Proof Identity and Access Management Solutions for the Digital Enterprise
PDF
Identity and Access Management (IAM)
PDF
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
PPTX
Identity and access management
PDF
Identiverse Zero Trust Customer Briefing, Identiverse 2019
PPTX
unit4.pptx
PDF
Advanced persistent threats
PDF
Understanding Identity Management and Security.
PDF
Introduction to Identity Management
PPTX
Vmware-Vsat-MDM-AlphaAlliance_part3.pptx
ODP
Building open source identity infrastructures
PPTX
IDM in telecom industry
PPTX
Smart Identity for the Hybrid Multicloud World
PPTX
OneIdentity - A Future-Ready Approach to IAM
PDF
Governance and Security Solution Patterns
Compliance & Identity access management
Why IAM is the Need of the Hour
Remote Access Policy Is A Normal Thing
Future-Proof Identity and Access Management Solutions for the Digital Enterprise
Identity and Access Management (IAM)
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
Identity and access management
Identiverse Zero Trust Customer Briefing, Identiverse 2019
unit4.pptx
Advanced persistent threats
Understanding Identity Management and Security.
Introduction to Identity Management
Vmware-Vsat-MDM-AlphaAlliance_part3.pptx
Building open source identity infrastructures
IDM in telecom industry
Smart Identity for the Hybrid Multicloud World
OneIdentity - A Future-Ready Approach to IAM
Governance and Security Solution Patterns

Recently uploaded (20)

PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Nekopoi APK 2025 free lastest update
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
ai tools demonstartion for schools and inter college
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
top salesforce developer skills in 2025.pdf
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Transform Your Business with a Software ERP System
Design an Analysis of Algorithms I-SECS-1021-03
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Nekopoi APK 2025 free lastest update
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Wondershare Filmora 15 Crack With Activation Key [2025
CHAPTER 2 - PM Management and IT Context
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
ai tools demonstartion for schools and inter college
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
How to Migrate SBCGlobal Email to Yahoo Easily
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
ISO 45001 Occupational Health and Safety Management System
top salesforce developer skills in 2025.pdf
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
L1 - Introduction to python Backend.pptx
Transform Your Business with a Software ERP System

Identity and Access Management in the Era of Digital Transformation

  • 1. Identity and Access Management in the Era of Digital Transformation Selvaratnam Uthaiyashankar VP – Engineering WSO2
  • 2. Identity and Digital Business • Identity is at the heart of Digital Business Image source: http://coranet.com/images/network-security.png
  • 3. Identity Centric • Digital Business is all about “User” – How do we know who is accessing – Things user can access or do – User’s preferences – Rules User has to adhere – Relationship with other entities
  • 4. Proper identity enforcement is essential for customer experience, security, privacy
  • 5. Authentication • Direct Authentication – Basic Authentication – Digest Authentication – TLS Mutual Authentication Service Providers Authentication Service Consumption Image Source : http://www.densodynamics.com/wp-content/uploads/2016/01/gandalf.jpg
  • 6. Digital business requires seamless integration of various systems…
  • 7. Identity Challenges When Integrating Multiple Systems • Different username, password (credential) for different systems – Preferred username is already taken – Using same username/password might become a security risk • Too many username, password • Loosing possible collaborations between applications
  • 8. Authentication • Brokered Authentication – SAML – OAuth : SAML2/JWT grant type – OpenID – OpenID Connect • Single Sign-On Service Providers Service Providers Service Providers Identity Provider Service Providers Authentication Service Consumption Trust Image source: http://savepic.ru/6463149.gif
  • 9. Users Might Want to Use Their Social Identities • BYOID
  • 10. Users Might Want to Use Their Enterprise Identity • Trust between different Identity Domains • Identity Federation Service Providers Service Providers Service Providers Identity Provider B Service Providers Authentication Service Consumption Trust Identity Provider A Trust
  • 13. Identity links all the systems. You just increased the risk of attack on your identity…
  • 14. Often, weak link is poor user credential https://www.infosecurity-magazine.com/news/compromised-credentials-quarter/
  • 15. Multi Factor Authentication • What you know • What you have • What you are Image source: http://it.miami.edu/_assets/images/multifactor1.png
  • 16. Adaptive Authentication • Ability to change authentication options based on the context https://3c1703fe8d.site.internapcdn.net/newman/gfx/news/hires/2013/howdochamele.jpg
  • 17. Provisioning Users • Self Service – Complete user management – User Portal • Approvals and Workflows • Just In Time Provisioning http://blog.genesys.com/wp-content/uploads/2014/07/Road-Sign-Self-Service.jpg
  • 18. Provisioning Users in Multiple Systems
  • 19. Access Control • Principle of least privilege • Role based access control • Attribute based access control • Fine-grained access control with XACML http://findbiometrics.com/assets/iStock_Access-300x225.jpg
  • 20. Auditing User Activities • You might not know who will access your system (BYOID) • Full Audit on user activities are important – Specially on User Management, Admin operations – Who, What, From Where, When, How • Accountability, Reconstruction, Problem Detection, Intrusion Detection http://cdn.gocertify.com/images/Auditing%20team%20going%20over%20report.jpg
  • 21. Analytics • Understanding user behavior • Predicting future needs • Fraud detection http://www.labrechedigital.com/images/analytics.png
  • 22. API Security • APIs are powering the Digital Business • Ability to secure the API (OAuth) • Identity delegation https://edinversity.files.wordpress.com/2013/07/handing-over-car-keys.jpg
  • 23. IoT is an Essential Element in Digital Business • Identity Include “Things” • Securing your IoT devices is a must • Consider scalability of your IAM System https://media.licdn.com/mpr/mpr/shrinknp_400_400/AAEAAQAAAAAAAAWRAAAAJDkwODMwYzIyLTA5MzktNDAwZi05ZmI4LWJkYT AyM2U4MDBlNQ.jpg
  • 24. Perimeter of Your Digital Business will Increase • Data is in cloud, mobile devices • Borders across systems don’t work anymore • Your Attack Surface increases – you can’t remove unused features in the cloud services • Security by obscurity doesn’t work anymore • Expect hacking, DoS attacks, phishing attack • Controlling access, monitoring, analyzing and predicting attacks are the way forward
  • 25. Bridging Cloud and Internal Systems • Connectors to bridge Cloud Systems and Internal Systems – Might not be able to open ports for outside world http://www.stratoscale.com/wp-content/uploads/gap-1080x1080.jpg
  • 26. Digital Business Requires Agility • Should be able to connect new systems easily • Frequent changes to external system • Future Proof • Needs some Identity Mediation Concepts http://s3-us-west-2.amazonaws.com/abacus-blog/wp-content/uploads/2015/10/dog-agility.png
  • 27. Digital Business Encourages Innovation • Often, security strategy is viewed as restrictive for Innovation – Specially, when involving with public services, APIs • Security should be transparent to the user for better user experience https://www.gatesnotes.com/~/media/Images/Articles/About-Bill-Gates/Accelerating- Innovation/innovation_2016_article_1200px_v1.jpg
  • 28. Digital Transformation Requires Cultural Changes • More and more, business units are in control rather than IT and security teams – Yet you need to know who is accessing, what they are accessing, etc. • Understanding this cultural shift will reduce frustrations http://www.leehopkins.net/wp-content/uploads/2010/11/iStock_000010822711XSmall_thumb.jpg