Identity and Access Management (IAM) overview (2024)

Learn the key issues and concepts for adding identity and access management to your internal and external services.

Ensuring that the right person gets access to the right services requires designing and implementing sign-in flows and access management. This usually involves integrating complex functionality into many areas of your applications. The solution impacts your end users and customers, your employees, and how easy it is to adapt changing security needs. Even small issues with the design or implementation can cause reliability issues, or worse, expose a weakness in your security.

The first challenge is understanding the requirements: who needs to access which services and what do they need to accomplish. It's not always as simple as employees and customers as there may be different types of access, such as a user versus an administrator. Designing and implementing the systems to meet your requirements can also require significant effort, though products such as Okta can reduce the time, effort, and risk.

This series of articles introduces you to the different parts of designing and implementing IAM for your services. This article is an overview of the following parts:

  • IAM concepts introduces the Workforce and Customer Identity models for IAM solutions and summarizes the main features of an IAM solution.

  • IAM design example illustrates a typical CIAM solution for an application that supports an organization's employees and customer users.

  • Designing an IAM solution summarizes the key areas of IAM. These areas include identity management, key architectural considerations, and a link to a glossary of key terms and concepts.

Some topics require more information. Those are covered in other parts of the series, including one that's a list of common terminology:

  • Identity management factors focuses on identity storage, processing, and related administration design.

  • Authentication factors describes design considerations for verifying that users are legitimate.

  • Authorization factors describes design considerations for defining what resources a user can access, and then granting or denying individual access requests (access control).

  • Architectural factors lists some of the more important architectural requirements to consider and identifies a few possible strategies for addressing them.

  • IAM terminology contains key definitions.

IAM concepts

Identity and Access Management (IAM) (also called Identity Security) secures your services in two ways. First, it verifies the identity of a user both when they sign-in and at other appropriate times. Second, it lets a user access only the parts of your network and services for which they have permission. For example, a customer may require only a username and password and is able to view and buy items. A vendor may also require a one-time passcode and is able to add and update items, but not buy them.

Workforce and Customer Identity

High-level designs for IAM may be called Customer or Workforce identity. The two have a significant overlap in use cases and technical approaches, but the most important thing is to design and build a solution that meets your particular requirements.

  • Workforce identity (Workforce or WF) solutions manage employee and contractor access to your organization's apps and resources. The main goal of WF solutions is to manage risk. User identities are usually assigned by the IT team. Use cases are typically administrative, such as controlling access to apps by integrating them into your single sign-on solution.

  • Customer identity (Customer Identity and Access Management* or CIAM) solutions add managing customer, partner, and other external access to WF. Ease of use for customers is important, as the goal is usually to increase both customer engagement and revenue. Unlike WF users, customers commonly create their own identities, may have multiple identities, and sign in from more locations and platforms. Use cases are typically user focused, such as user experience, and building branded user registration and sign-in flows.

Identity and Access Management (IAM) overview (1)

Features of an IAM solution

You can divide the features of an IAM system into three areas: user experience, security, and infrastructure. The following diagram illustrates the most important features in each area.

Identity and Access Management (IAM) overview (2)

Infrastructure

  • Scalability: Design your solution to allow for user growth, changing use patterns, and evolutionary changes to your applications and infrastructure, without requiring a redesign.

  • Easy integration with app stack: Decouple your IAM solution from your applications to allow them to evolve independently and enable multiple apps to use your solution. Enable integration with your apps that optimizes performance by designing an event-based interface that is accessed using an API. Provide an SDK to make integration easier.

  • Traffic surge protection: Provide a way to prevent sudden bursts of requests from disrupting usage or operations.

  • High availability: Ensure that all elements of your IAM solution are fully operational whenever your apps are expected to be operable.

  • High reliability (highly redundant): Ensure that all elements of your IAM solution are highly reliable and dependable, and that every element of your solution works correctly, every time.

Security

  • User storage and password management: Store and manage information about your users, including their passwords, for authenticating and authorizing users.

  • MFA (Multifactor Authentication): Require a user to verify their identity in different ways. Some of these ways include knowledge, such as answers to questions, biometrics, such as a fingerprint, or possession, such as a key-card. MFA is key to controlling access to your applications.

  • DDoS protection: Prevent Distributed Denial of Service (DDoS) attacks from blocking legitimate use of your applications.

  • Compliance: Ensure that your solution complies with specific regulatory requirements for privacy, as well as with industry and local cybersecurity standards. For example, applications that handle healthcare patient data must conform to the Health Insurance Portability and Accountability Act (HIPAA), financial solutions may require SOX or PCI, and any server in Europe must follow the European Union's General Data Privacy Regulations (GDPR).

  • Data access control: Develop facilities to grant or deny specific user requests to access apps and resources based on policies, user authentication and authorizations, and other data. Application developers embed access control checks throughout their code to enforce your access requirements.

User experience

  • Self service: Allow end users, especially customers, to self-administer their accounts, including creation, password reset, and originating access requests. This can increase customer satisfaction, reduce friction, and reduce your admin workload.

  • Social auth (social authentication): Allow end users to sign in with their social media credentials, such as a Facebook or LinkedIn ID, rather than special credentials for your IAM solution. This can enhance customer satisfaction, provide reliable user demographic information, and reduce admin workload. (Social authentication is a special case of external IdP authentication, below.)

  • External IdP (external Identity Provider): Allow users to sign in using a sign-in ID from an external Identity Provider, such as Active Directory, rather than special credentials for your apps. This can increase user satisfaction and reduce your admin workload.

  • SSO (Single Sign-On): Allow users to sign in with a single ID to access multiple related applications. This can increase user satisfaction and reduce admin workload. Closely related is FIM (federated identity management), in which users sign in and access multiple federated external Identity Providers. It has the same benefits as SSO, and allows users to sign in with their existing sign-in IDs.

  • Automated onboarding: Automate onboarding workflows and lifecycle management, such as manage a new user's AWS SSO entitlements, capture document signatures, and provision and deprovision user app accounts. This minimizes the time and effort to provision new users and perform other lifecycle change procedures, reduces errors and admin workload, and creates a positive experience for new users.

  • Frictionless MFA experience: Use special strategies, such as SSO or simplified sign-in flows from managed devices to streamline user sign-in flows.

IAM design example

The figure below shows a typical CIAM solution for an application that supports an organization's employees and customer users (B2B). End users sign in to the web portal or mobile app in a variety of ways. All end users sign in to the same system, but sign-in behavior and available services are user- and organization-specific. The example illustrates some of IAM's complexity and areas where it can affect an application's high-level design.

This is an AWS-hosted healthcare application, though you can readily adapt the abstract design to applications in any domain. The IAM design considerations are generic and could apply to any app. The Health Insurance Portability and Accountability Act (HIPAA) is the compliance requirement for healthcare, in the way that PCI is the requirement for credit card processing.

The application is used by the organization's employees and by other large corporations, which results in tens of millions of end users. Most end users are patients, and most primary users are physicians, nurses, and other medical personnel.

Identity and Access Management (IAM) overview (3)

The figure shows a few aspects of the IAM solution:

  • Cloud-based IAM platform

  • AWS compatibility

  • Single Sign-On (SSO)

  • External Identity Providers

  • Social authentication

  • System for Cross-domain Identity Management (SCIM) provisioning

  • OAuth 2.0 and OpenID Connect (OIDC) authorization and authentication

  • Security Assertion Markup Language (SAML) authentication

  • Multifactor Authentication (MFA) and Universal 2nd Factor (U2F) authentication

  • User-specific authentication flows

  • Health Insurance Portability and Accountability Act (HIPAA) compliance

  • Mobile and desktop device support

  • Self-registration

  • IAM security logging

  • B2B and B2C support

  • Customer administration

The design of the solution was also impacted by other concerns:

  • Architectural properties, such as reliability, availability, performance, scalability, and ease of integration.

  • Features, such as SSO, access control, and administration.

  • Customizations, such as branding and tailored flows.

Designing an IAM solution

The design of any IAM solution must consider the following areas:

  • Identity management: Store and manage data to uniquely identify every authorized individual, business, device, app, and other resource, along with their attributes and policies. This is your main source of data for user authentication, authorization, and access control.

  • Authentication: Verify that user sign-in credentials are both legitimate and being used by their owners.

  • Authorization: Define what resources a given user is allowed to access and what functions they are allowed to perform with them.

  • Access control: Grant or deny individual requests to view or update a restricted resource based on the resource, the nature of the request, whether the user is authenticated, the user's authorizations, relevant policies, and other data. (Access control is part of authorization.)

All of these functions must be highly reliable, available, secure, and performant.

Note: The figure in Features of an IAM solution compactly summarizes important features to consider, but some of them fall into two or more of the functional areas above. For more clarity, features in this section are grouped by the main area in which they apply. The areas are ordered as above, with access control included with authorization.

Other articles in this series give more detail on the issues, factors, and strategies for specific areas.

See IAM Terminology for definitions of some terms and concepts used in this article.

Next step: Identity Management Factors.

Identity and Access Management (IAM) overview (2024)

FAQs

Identity and Access Management (IAM) overview? ›

Identity and access management software provides tools to help organizations verify the identities of the people and devices trying to log in and ensures that verified users have access to the right resources. It's a centralized way of verifying identification, managing access, and flagging security breaches.

What is the overview of identity and access management? ›

Identity and access management is for making sure that only the right people can access an organization's data and resources. It's a cybersecurity practice that enables IT administrators to restrict access to organizational resources so that only the people who need access have access.

What are the 4 pillars of IAM? ›

The four pillars of identity and access management (IAM) are IGA, AM, PAM, and ADmgmt. If that sounds like a bunch of random letters, you're in the right place.

What are the 4 components of identity access management? ›

IAM components can be classified into four major categories: authentication, authorisation, user management, and central user repository. Authentication is the module through which a user provides sufficient credentials to gain initial access to an application system of a particular resource.

What is the concept of IAM? ›

Identity and access management (IAM) is the practice of making sure that people and entities with digital identities have the right level of access to enterprise resources like networks and databases. User roles and access privileges are defined and managed through an IAM system.

What is the main goal of IAM? ›

The purpose of IAM is to stop hackers while allowing authorized users to easily do everything they need to do, but not more than they're allowed to do. IAM implementations use a variety of tools and strategies to achieve this goal, but they all tend to follow the same basic structure.

Could you describe IAM in your own words? ›

Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.

What are the 4 A's of IAM? ›

After covering some elements of administration and auditing in IAM (#directory services, #iga, identity #provisioning and user lifecycle management, #accessgovernance), this article will now look at #accessmanagement and thus the #authentication pillar within the 4A of IAM - administration, auditing, authentication and ...

What are the 3 A's of IAM? ›

IAM procedures and technologies help to get the authentication problem under control. Authentication can take place as an individual process or can be combined with authorization and accounting. An effective password strategy is the key to an effective authentication process.

What are the 3 types of IAM principals? ›

Principals
  • a principal is an IAM entity allowed to interact with AWS resources, and can be permanent or temporary, and represent a human or an application.
  • three types of principals. ...
  • Root User. ...
  • IAM Users. ...
  • Roles/Temporary Security Tokens.

What is an example of identity and access management IAM? ›

Multi-factor authentication means that your IAM provider requires more than one type of proof that you are who you say you are. A typical example is requiring both a password and a fingerprint. Other MFA choices include facial recognition, iris scans, and physical tokens like a Yubikey.

What are the stages of identity and access management? ›

8 Identity and Access Management Implementation Steps
  • Determine your business goals. ...
  • Evaluate your existing IT landscape. ...
  • Decide between cloud, on-premises, or hybrid deployments. ...
  • Choose the right IAM solution for your organization. ...
  • Assess IAM implementation costs.
May 2, 2024

What are the three principles of identity and access management? ›

Zero Trust is a security framework built on the principles of explicit verification, least privileged access, and breach assumption. IAM processes grant targeted access control and visibility for centrally managing resources.

Which IAM tool is best? ›

The top IAM tools for 2024, including IBM Security Identity and Access Assurance, Microsoft Azure Active Directory, Ping Identity, Google Cloud IAM, and ManageEngine ADManager Plus, offer unique strengths to address the evolving security landscape.

What is IAM role in simple words? ›

AWS Identity and Access Management (IAM) roles are entities you create and assign specific permissions to that allow trusted identities such as workforce identities and applications to perform actions in AWS.

What is IAM for beginners? ›

Identity and access management provides control over user validation and resource access. Commonly known as IAM, this technology ensures that the right people access the right digital resources at the right time and for the right reasons.

What are the three A's of identity and access management? ›

Authentication, Authorization, and Accounting (AAA) is a three-process framework used to manage user access, enforce user policies and privileges, and measure the consumption of network resources.

What are the three stages of an identity and access management system? ›

IAM systems mainly perform three basic tasks: identifying, authenticating, and authorizing. This means that only the intended persons are allowed access to specific hardware, software, applications, and IT resources—as well as specific data and content—to perform tasks.

Top Articles
Latest Posts
Article information

Author: Catherine Tremblay

Last Updated:

Views: 6609

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Catherine Tremblay

Birthday: 1999-09-23

Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

Phone: +2678139151039

Job: International Administration Supervisor

Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.