Write an essay of at least 500 words discussing discussing IAM in a federated cloud application.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.
Running Head Identity and Access Management
Title:
Name:
Institution:
Course Code:
1
Identity and Access Management
2
The management of identities and access control remains a major problem with enterprise
application until this date. An enterprise may be able to use some of the cloud computing
services without a proper IAM strategy eventually it becomes a necessity in the organization.
This discussion will focus on the major functionalities of IAM that allow for effective
management of identities in the cloud.
Identity provisioning, this is the process of creating digital identities (accounts) for users
of a system and linking appropriate rights to identities (Gupta, 2009). The secure and timely
management of onboarding and offboarding users in a cloud is a complicated and difficult task
that is why enterprises invest in a user management system.
Authentication, this is determining the user is who they claim to be, this can be done
through a username and password or the use of biometrics. Authentication related challenges
must be addressed when the cloud is being used. This includes the storage of authentication
details and credential management.
Federation Cloud federation is the practice of interconnecting the cloud
computing environments of two or more service providers for the purpose of load
balancing traffic and accommodating spikes in demand (Rouse 2019). Federated identity
management allows organizations to authenticate their cloud users through a chosen IDP
(Identity Provider). Federated identity management comes with its challenges and possible
remedies. The challenges come about as a result of the identity lifecycle and authentication
methods available. Authorization and User Profile Management, the provision for access control
measures and they type of data and services based on the user profile and the permissions
granted. Compliance with internal and external requirements is also a major factor that is put into
consideration in cloud-based services.
Identity and Access Management
3
IAM in cloud services and on premise services are quite similar and almost use the same
techniques in access and identity management. The new technologies make security easier and
much more effective. Authentication and authorization are very important parts in the access and
identity management, how the credentials are also stored are very important. Some examples of
cloud infrastructure providers include Microsoft Azure, Amazon web service and IBM.
References
Identity and Access Management
Gupta, J. N. (2009). Handbook of research on information security and assurance. S. K. Sharma
(Ed.). Information Science Reference
What is cloud federation? – Definition from WhatIs.com. (2020). Retrieved 5 February 2020,
from https://searchnetworking.techtarget.com/definition/cloud-federation
Vines, R. L. K. R. D., & Krutz, R. L. (2010). Cloud security: A comprehensive guide to secure
cloud computing (pp. 35-41). Wiley Publishing, Inc.
4