SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 1 Issue 5 ǁ December 2016.
w w w . i j m r e t . o r g Page 43
Identity Management In Cloud Computing
Mr. Chris Villemuer& Dr. Syed Adeel Ahmed
Abstract:This paper discusses the adoption of cloud computing by many businesses and organizations. Cloud
adoption has many benefits such as reduced IT costs, and accelerated adoption of new services. However, this
accelerated adoption present challenges to effective Identity Management. Many existing Identity Management
problems exist in cloud computing, but are further complicated. Now IT professionals must think outside the
realm of the internal IT infrastructure to integrate cloud services into the organization. User
provisioning/deprovisioning, credential management, auditing/access monitoring, and federal regulation
compliance must be considered across the boundaries of the internal organization’s network. Traditional
Identity Management systems can be leveraged to solve these issues. Most cloud service providers have means
to integrate on-premise Identity Management systems and identity records into their services. This requires
bridiging and/or proxy systems for on-premise resources to interact with cloud services. Vendors such as
Microsoft andCelestix provide such systems that bridge between on-premise and the cloud. New solutions are
also being developed and adopted with a “cloud first” approach in the form of Identity as a Service (IDaaS).
This is an evolving new approach that has potential to also revolutionize how Identity Management is conducted
in organizations. Any solutions adopted to meet cloud Identity Management challenges must still comply with
organizational and federal regulation requirements.
Keywords:Cloud, Identity Management, IDaaS, password sprawl, on- premise, auditing, compliance
I. Introduction
The Information Technology industry has been
embracing a new computing model in recent years.
This model is known as cloud computing.Prior to
this, many organizations administered to and
operated their own physical IT infrastructures from
within, also referred to as on-premise computing.
Hosting resources on-premise has proven to be
costly. Industry practices such as the “5 Year Rule”
for replacing on-premise hardware continually drives
up costs. The figure below is an example of the
TCO(Total Cost of Ownership) to host an application
on a physical server vs hosting on a virtual server in
the Microsoft Windows Azure cloud. The TCO for
on-premise hosting over 5 years is greater than
hosting in Azure (Wlodarz, 2013).
Figure 1.TCO generated from http://softwareadvice.com/tco/
To reduce these costs, organizations have been
moving various IT roles and services to cloud
platforms. While this approach has proven effective
at reducing up-front costs such as hardware
maintenance, it presents new challenges for
enterprise Identity Management. Failing to meet
these challenges can have higher costly results than
the net savings gained from cloud adoption. There
are solutions and approaches available to help
organizations gain the benefits of cloud adoption
while limiting risk and facing challenges associated
with effective Identity Management in cloud
computing.
II. Problem
Cloud platforms and services provide various
benefits such as cost savings andmore rapid
deployment of applications/service. However,
Identity and Access Management for these entities
remains a constant need. IT professionals within an
organization are still responsible for facilitating user
access to these new cloud services. In many cases,
this facilitation requires on-premise processes and
resources to interact with cloud providers. This
results in an increased scope of Identity Management
and security controls.
2.1. User Provisioning/Deprovisioning
At the core of Identity Management is
provisioning identities/users within systems. This
establishes “who am I” with a system’s context.
These established identities are then granted access to
system components based on varying criteria such as
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 1 Issue 5 ǁ December 2016.
w w w . i j m r e t . o r g Page 44
roles.IdM systems such as Microsoft Identity
Manager 2016 or Oracle Identity Manager are
responsible for provisioning and deprovisioning
identities in various on-premise systems. Setup and
on-going maintenance of these Identity and Access
Management systems for on-premise services are
traditionally costly. In many cases, custom logic is
written into these systems to interact with specific
on-premise systems. Unfortunately, many traditional
IdM systems are not designed to operate outside of an
enterprise firewall, or simply do not have adequate
controls to interact with continually evolving cloud
services (Musthaler, 2013). As a result, IT
professionals must develop customized manual or
partially automated processes to integrate cloud
services into the IT infrastructure. These cloud
services often have their own login systems and
connector APIs that do not always work with
internal/on-premiseIdM systems (Chickowski, 2013).
2.2. User Password Sprawl
Once an identity is provisioned in a cloud system,
sufficient credentials must be established to leverage
it. The user must present these credentials to
authenticate access to a system. The most frequently
used form of credential is a username and password
combination. Many organizations must comply with
federal laws and regulations for securely managing
user credentials.
On-premise applications either have their own
identity stores, or somehow leverage an existing
identity store containing credentials. Cloud-based
services often follow the same model. However,
many organizations employ firewalls or other
security controls to prevent external entities from
accessing on-premise credentials. This presents an
added challenge for integrating cloud services into
existing IT infrastructures. A quick workaround to
this problem is to simply provision a new identity and
set of credentials in the cloud. More often than
desired, organizations use this workaround to
continue with rapid deployment of new cloud
services.
The end result is a sprawl of username and
password combinations across many cloud services
with users having to track these identities. According
to Centrify, a popular IT Enterprise IDaaS provider,
this has led to users writing down passwords on
sticky notes or other easily accessible forms. These
practices by users often result in increased security
risk for the organization, and dissatisfaction among
the user experience. This additional layer of identity
management also creates administrative overhead
that can overwhelm help desk managers and IT
administrators(Centrify, 2015).
2.3. Auditing and Compliance
Many organizations have an Information Security
Policy document that employees must follow. This
document defines security requirements for
leveraging IT in an organization. The definitions are
often derived from internal security requirements,
and federal regulatory requirements such as Sarbanes
Oxley and HIPAA. However, the existence alone of
this document is not enough to reduce security risk.
Users do not always comply with policies defined in
these documents for various reasons such as lack of
understanding, or willful disregard of the policies.
This demonstrates the need for IT security
compliance and auditing. These are also important
components of Identity Management. Once an
identity is established within a system, its access into
critical data must be monitored. Audit policies and
practices within systems allow activities to be tied to
an individual’s usage. This reduces risks associated
with fraud, theft, and other potential breaches of
valuable information (Howarth, 2014).
Most on-premise systems allow IT administrators
to have granular control and visibility into raw audit
logging data. However, cloud services do not offer
the same functionality. Two common reasons for this
are technical limitations by the cloud provider that
make it not possible to share this information, or
unwillingness by cloud provider to share this
information. In general, terms and conditions offered
by even IDaaS cloud providers are not equivalent to
features offered by on-premise environments (Bedell,
2012). The feature disconnect in other cloud services
without Identity Management as a focus is likely to
be even greater.
III. Solution
The most commonly used approach to dealing with
Identity Management issues in the cloud is to
leverage on-premise Identity Management
infrastructure as much as possible. This is an
intuitive approach, which is likely to have the least
overall cost in the long term, due to reduced risk of
managing separate identities and avoiding
unnecessary investments in extraneousIdentity
Management processes or systems.
There are also cloud-based solutions available that
can integrate with on-premise systems, as well as
operate primarily in the cloud.
3.1. SingleSign-On
Identity Federation/Single Sign-On (SSO) has
become widely adopted among organizations in
recent years. It allows organizations to share identity
and access information without actually transmitting
copies of identity records and/or passwords.
A widely used SSO system is Microsoft’s Active
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 1 Issue 5 ǁ December 2016.
w w w . i j m r e t . o r g Page 45
Directory Federation Services (ADFS). ADFS is
included as a feature of the Windows Server
operating system at no additional financial cost. It
allowsorganizations to create federated trusts with
SSO systems in other organizations. Many cloud
providers, such as Microsoft’s Office 365, have
seamless integration into ADFS. ADFS allows
organizations to use credentials in existing Active
Directory and LDAP directories. Leveraging on-
premise credentials reduces the risksassociated with
duplicating usernames and passwords across multiple
systems. It also allows rapid deprovisioning and
access control for users in cloud applications and
services(Chickowski, 2013). Furthermore, on-
premise audit logging systems still retain much of
desired visibility into user access since authentication
events occur on-premise.
Companies such as Celestix provide tools to further
enhance the native integration of ADFS and Office
365. Celestix Federated is a made-ready solution that
allows seamless implementations of ADFS and
integration into existing Identity Management
infrastructure (Celestix, 2016).
3.2. Identity Synchronization & Proxy
Another approach is to establish proxy services
between on-premise identities and cloud providers.
While identity federation / SSO can be viewed as a
cloud Identity Management proxy system, it is
different because it is built on industry standards that
were designed to meet needs beyond Identity
Management for cloud systems. Some vendors today
provide proprietary systems that are specifically
designed to integrate on-premise identities with their
own cloud services.
Microsoft provides a free identity
proxy/synchronization system known as Azure Active
Directory Connect. This tool is designed to
synchronize on-premise Active Directory identities to
Office 365 and Azure cloud services. It allows for
user provisioning/deprovisioning, bi-directional
password synchronization, and group filtering. While
it is not security best practice to distribute user
credentials to other systems, password
synchronization does reduce the number of distinct
passwords a user must track. Which in turn reduces
the risk a user will carelessly write passwords down
on sticky-notes or other unsecure media. Also, group
filtering allows on-premiseaccess control to cloud
based systems, as well as leveraging existing auditing
infrastructure for compliance.
Centrify offers an on-premise proxy service called
Centrify Cloud Connector. This allows integration of
on-premise identities in Active Directory to
CentrifyIDaaS. This integration behaves as a true
proxy. Identity datais not required to be synchronized
to the cloud(Centrify, 2015). This eliminates the risk
associated with user credential sprawl as it fully
leverages existing on-premise Identity Management
infrastructure. CentrifyIDaaS then bridges these
identities into cloud services such as Office 365, and
Google Apps for Work.
3.3. Identity as a Service (IDaaS)
The most rapidly developing approach to managing
identities in cloud computing is Identity as a Service.
This solution has minimal to no interaction with on-
premise Identity Management systems. In some
cases, IDaaScan be the primary Identity Management
system and/or provider for an organization. Identities
are provisioned and managed in the cloud, then
presented to on-premise resources as needed.
PingIdentity provides an IDaaS solution called
PingOne Directory. Identities are provisioned and
managed in the PingOne Directory, and are made
available via PingIdentity’s SSO services.
PingIdentity integrates with many popular SaaS
cloud service providers such as Office 365, Google
Apps, Box, and Amazon Web Services(PingIdentity,
2016). The PingIdentity SSO service can then be
leveraged by on-premise resources such as ADFS.
While IDaaS is an emerging technology with a
significantly different model than on-premise Identity
Management systems, it shows promise for managing
identities in the cloud. Unlike traditional IdM
systems, IDaaS systems are being designed with a
“cloud first” mentality. Organizations must be
cautious in adopting IDaaS, as thorough testing and
evaluation should be performed to ensure the desired
IDaaS cloud service meets IT operational,
administrative, and security requirements for the
organization.
IV. Conclusion
Many organizations will continue to adopt cloud
computing at an accelerated rate. This adoption will
revolutionize how IT and business operations are
conducted. However, the need for effective Identity
Management remains constant. Cloud platforms
present new challenges to Identity Management such
as working around firewalls, while also
demonstrating the need to address classic challenges.
Effective user provisioning/deprovisioning and
credential management process are still needed.
Organizations must continue to comply with federal
regulations for auditing and access of sensitive data.
Classic solutions can be adopted to address the
Identity Management challenges of cloud computing.
New approaches such as IDaaS also present
opportunities to supplement and/or improve IT
industry standards for Identity Management. In the
end, organizations must decide which Identity
Management approaches best meet business needs.
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 1 Issue 5 ǁ December 2016.
w w w . i j m r e t . o r g Page 46
REFERENCES
[1.] Bedell, C. (2012, November).
Understanding IDaaS: The benefits and risks
of Identity as a Service. Retrieved from
TechTargetSearchCloudSecurity:
http://searchcloudsecurity.techtarget.com/fea
ture/Understanding-IDaaS-The-benefits-
and-risks-of-Identity-as-a-Service
[2.] Celestix. (2016). 5 Must-Know Benefits of
Microsoft Active Directory Federation
Services (ADFS). Retrieved from
Celestix:http://www.celestix.com/5-must-
know-benefits-of-microsoft-active-
directory-federation-services-adfs/
[3.] Centrify. (2015, August 06). Stop Password
Sprawl with App Single Sign-on via Active
Directory. Retrieved from Centrify:
https://www.centrify.com/media/1113447/w
hitepaper-stop-password-sprawl-en.pdf
[4.] Chickowski, E. (2013, October 25). Identity
Management In The Cloud. Retrieved from
InformationWeek DarkReading:
http://www.darkreading.com/identity-
management-in-the-cloud/d/d-id/1140751?
[5.] Howarth, F. (2014, April 17). Identity
Management in the Cloud: Top Tips for
Secure Identities. Retrieved from
SecurityIntelligence:
https://securityintelligence.com/identity-
management-cloud-tips-secure-identities-
iam/
[6.] Musthaler, L. (2013, January 18). Identity
and access management as a cloud-based
service eliminates time, pain and cost.
Retrieved from Network World:
http://www.networkworld.com/article/21637
44/infrastructure-management/identity-and-
access-management-as-a-cloud-based-
service-eliminates-time-p.html
[7.] PingIdentity. (2016). PingOne Directory.
Retrieved from PingIdentity:
https://www.pingidentity.com/en/products/pi
ngone/directory.html
[8.] Wlodarz, D. (2013, November 04).
Comparing cloud vs on-premise? Six hidden
costs people always forget about. Retrieved
from Betanews:
http://betanews.com/2013/11/04/comparing-
cloud-vs-on-premise-six-hidden-costs-
people-always-forget-about/

Más contenido relacionado

La actualidad más candente

Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Planning A Secure Partner Portal
Planning A Secure Partner PortalPlanning A Secure Partner Portal
Planning A Secure Partner PortalLeo de Sousa
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a serviceDell World
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
Securing a Collaborative Environment
Securing a Collaborative EnvironmentSecuring a Collaborative Environment
Securing a Collaborative EnvironmentJoseph Pidala
 
A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...ijccsa
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskCloudMask inc.
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMatthew J McMahon
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
Implementing Iris in the Railway Control Office Application for Secure Saas i...
Implementing Iris in the Railway Control Office Application for Secure Saas i...Implementing Iris in the Railway Control Office Application for Secure Saas i...
Implementing Iris in the Railway Control Office Application for Secure Saas i...IJERA Editor
 
Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Informationpabatan
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 

La actualidad más candente (20)

Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Planning A Secure Partner Portal
Planning A Secure Partner PortalPlanning A Secure Partner Portal
Planning A Secure Partner Portal
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Securing a Collaborative Environment
Securing a Collaborative EnvironmentSecuring a Collaborative Environment
Securing a Collaborative Environment
 
A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy Paper
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Implementing Iris in the Railway Control Office Application for Secure Saas i...
Implementing Iris in the Railway Control Office Application for Secure Saas i...Implementing Iris in the Railway Control Office Application for Secure Saas i...
Implementing Iris in the Railway Control Office Application for Secure Saas i...
 
Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Information
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 

Similar a Identity Management In Cloud Computing

Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsIJERA Editor
 
Running head SESSION HIJACKING & CLOUD COMPUTING .docx
Running head SESSION HIJACKING & CLOUD COMPUTING                 .docxRunning head SESSION HIJACKING & CLOUD COMPUTING                 .docx
Running head SESSION HIJACKING & CLOUD COMPUTING .docxcharisellington63520
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Club Alliances
 
Data Management Trends 2022_Shailendra Mruthyunjayappa.pdf
Data Management Trends 2022_Shailendra Mruthyunjayappa.pdfData Management Trends 2022_Shailendra Mruthyunjayappa.pdf
Data Management Trends 2022_Shailendra Mruthyunjayappa.pdfShailendra Mruthyunjayappa
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huangKen Huang
 
Hybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have RequirementsHybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have RequirementsJamcracker Inc
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single IdentityVladimir Jirasek
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxjeffsrosalyn
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Tableau Software
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
Every cloud has a silver lining
Every cloud has a silver liningEvery cloud has a silver lining
Every cloud has a silver liningAditya Dashora
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud ComputingJoseph Williams
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 

Similar a Identity Management In Cloud Computing (20)

Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patterns
 
Running head SESSION HIJACKING & CLOUD COMPUTING .docx
Running head SESSION HIJACKING & CLOUD COMPUTING                 .docxRunning head SESSION HIJACKING & CLOUD COMPUTING                 .docx
Running head SESSION HIJACKING & CLOUD COMPUTING .docx
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
 
Data Management Trends 2022_Shailendra Mruthyunjayappa.pdf
Data Management Trends 2022_Shailendra Mruthyunjayappa.pdfData Management Trends 2022_Shailendra Mruthyunjayappa.pdf
Data Management Trends 2022_Shailendra Mruthyunjayappa.pdf
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
Hybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have RequirementsHybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have Requirements
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
 
Cloud
CloudCloud
Cloud
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Every cloud has a silver lining
Every cloud has a silver liningEvery cloud has a silver lining
Every cloud has a silver lining
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 

Más de International Journal of Modern Research in Engineering and Technology

Más de International Journal of Modern Research in Engineering and Technology (20)

Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...
Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...
Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...
 
Building an integrated vertical chain - a factor for sustainable construction
Building an integrated vertical chain - a factor for sustainable constructionBuilding an integrated vertical chain - a factor for sustainable construction
Building an integrated vertical chain - a factor for sustainable construction
 
Applicability Study on the Optical Remote Sensing Techniques in a River
Applicability Study on the Optical Remote Sensing Techniques in a RiverApplicability Study on the Optical Remote Sensing Techniques in a River
Applicability Study on the Optical Remote Sensing Techniques in a River
 
There is Always A Better Way: The Argument for Industrial Engineering
There is Always A Better Way: The Argument for Industrial EngineeringThere is Always A Better Way: The Argument for Industrial Engineering
There is Always A Better Way: The Argument for Industrial Engineering
 
Study on the LandCover Classification using UAV Imagery
Study on the LandCover Classification using UAV ImageryStudy on the LandCover Classification using UAV Imagery
Study on the LandCover Classification using UAV Imagery
 
Comparative Analysis between Five Level Conventional and Modified Cascaded H-...
Comparative Analysis between Five Level Conventional and Modified Cascaded H-...Comparative Analysis between Five Level Conventional and Modified Cascaded H-...
Comparative Analysis between Five Level Conventional and Modified Cascaded H-...
 
Cytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer Cells
Cytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer CellsCytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer Cells
Cytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer Cells
 
Investigation of Performance Properties of Graphene Coated Fabrics
Investigation of Performance Properties of Graphene Coated FabricsInvestigation of Performance Properties of Graphene Coated Fabrics
Investigation of Performance Properties of Graphene Coated Fabrics
 
Effects of bagasse ash additive on the physiochemical and biological paramete...
Effects of bagasse ash additive on the physiochemical and biological paramete...Effects of bagasse ash additive on the physiochemical and biological paramete...
Effects of bagasse ash additive on the physiochemical and biological paramete...
 
Production and Analysis of Bioresin From Mango (Mangifera Indica) Kernel Oil
Production and Analysis of Bioresin From Mango (Mangifera Indica) Kernel OilProduction and Analysis of Bioresin From Mango (Mangifera Indica) Kernel Oil
Production and Analysis of Bioresin From Mango (Mangifera Indica) Kernel Oil
 
Particle Swarm Optimization Algorithm Based Window Function Design
Particle Swarm Optimization Algorithm Based Window Function DesignParticle Swarm Optimization Algorithm Based Window Function Design
Particle Swarm Optimization Algorithm Based Window Function Design
 
Computed Tomography Image Reconstruction in 3D VoxelSpace
Computed Tomography Image Reconstruction in 3D VoxelSpaceComputed Tomography Image Reconstruction in 3D VoxelSpace
Computed Tomography Image Reconstruction in 3D VoxelSpace
 
Antimicrobial Activity of Capsicum Essential Oil of Peppers
Antimicrobial Activity of Capsicum Essential Oil of PeppersAntimicrobial Activity of Capsicum Essential Oil of Peppers
Antimicrobial Activity of Capsicum Essential Oil of Peppers
 
Design of Window Function in LABVIEW Environment
Design of Window Function in LABVIEW EnvironmentDesign of Window Function in LABVIEW Environment
Design of Window Function in LABVIEW Environment
 
A study of the temporal flow of passenger and cargo transport in a Brazilian ...
A study of the temporal flow of passenger and cargo transport in a Brazilian ...A study of the temporal flow of passenger and cargo transport in a Brazilian ...
A study of the temporal flow of passenger and cargo transport in a Brazilian ...
 
Determination of Linear Absorption Coefficient for Different Materials
Determination of Linear Absorption Coefficient for Different MaterialsDetermination of Linear Absorption Coefficient for Different Materials
Determination of Linear Absorption Coefficient for Different Materials
 
Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...
Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...
Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...
 
Kinematics Modeling and Simulation of SCARA Robot Arm
Kinematics Modeling and Simulation of SCARA Robot ArmKinematics Modeling and Simulation of SCARA Robot Arm
Kinematics Modeling and Simulation of SCARA Robot Arm
 
Air and Moisture Permeability of Textiles
Air and Moisture Permeability of TextilesAir and Moisture Permeability of Textiles
Air and Moisture Permeability of Textiles
 
Strength and durability assessment of concrete substructure in organic and hy...
Strength and durability assessment of concrete substructure in organic and hy...Strength and durability assessment of concrete substructure in organic and hy...
Strength and durability assessment of concrete substructure in organic and hy...
 

Último

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 

Último (20)

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 

Identity Management In Cloud Computing

  • 1. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 1 Issue 5 ǁ December 2016. w w w . i j m r e t . o r g Page 43 Identity Management In Cloud Computing Mr. Chris Villemuer& Dr. Syed Adeel Ahmed Abstract:This paper discusses the adoption of cloud computing by many businesses and organizations. Cloud adoption has many benefits such as reduced IT costs, and accelerated adoption of new services. However, this accelerated adoption present challenges to effective Identity Management. Many existing Identity Management problems exist in cloud computing, but are further complicated. Now IT professionals must think outside the realm of the internal IT infrastructure to integrate cloud services into the organization. User provisioning/deprovisioning, credential management, auditing/access monitoring, and federal regulation compliance must be considered across the boundaries of the internal organization’s network. Traditional Identity Management systems can be leveraged to solve these issues. Most cloud service providers have means to integrate on-premise Identity Management systems and identity records into their services. This requires bridiging and/or proxy systems for on-premise resources to interact with cloud services. Vendors such as Microsoft andCelestix provide such systems that bridge between on-premise and the cloud. New solutions are also being developed and adopted with a “cloud first” approach in the form of Identity as a Service (IDaaS). This is an evolving new approach that has potential to also revolutionize how Identity Management is conducted in organizations. Any solutions adopted to meet cloud Identity Management challenges must still comply with organizational and federal regulation requirements. Keywords:Cloud, Identity Management, IDaaS, password sprawl, on- premise, auditing, compliance I. Introduction The Information Technology industry has been embracing a new computing model in recent years. This model is known as cloud computing.Prior to this, many organizations administered to and operated their own physical IT infrastructures from within, also referred to as on-premise computing. Hosting resources on-premise has proven to be costly. Industry practices such as the “5 Year Rule” for replacing on-premise hardware continually drives up costs. The figure below is an example of the TCO(Total Cost of Ownership) to host an application on a physical server vs hosting on a virtual server in the Microsoft Windows Azure cloud. The TCO for on-premise hosting over 5 years is greater than hosting in Azure (Wlodarz, 2013). Figure 1.TCO generated from http://softwareadvice.com/tco/ To reduce these costs, organizations have been moving various IT roles and services to cloud platforms. While this approach has proven effective at reducing up-front costs such as hardware maintenance, it presents new challenges for enterprise Identity Management. Failing to meet these challenges can have higher costly results than the net savings gained from cloud adoption. There are solutions and approaches available to help organizations gain the benefits of cloud adoption while limiting risk and facing challenges associated with effective Identity Management in cloud computing. II. Problem Cloud platforms and services provide various benefits such as cost savings andmore rapid deployment of applications/service. However, Identity and Access Management for these entities remains a constant need. IT professionals within an organization are still responsible for facilitating user access to these new cloud services. In many cases, this facilitation requires on-premise processes and resources to interact with cloud providers. This results in an increased scope of Identity Management and security controls. 2.1. User Provisioning/Deprovisioning At the core of Identity Management is provisioning identities/users within systems. This establishes “who am I” with a system’s context. These established identities are then granted access to system components based on varying criteria such as
  • 2. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 1 Issue 5 ǁ December 2016. w w w . i j m r e t . o r g Page 44 roles.IdM systems such as Microsoft Identity Manager 2016 or Oracle Identity Manager are responsible for provisioning and deprovisioning identities in various on-premise systems. Setup and on-going maintenance of these Identity and Access Management systems for on-premise services are traditionally costly. In many cases, custom logic is written into these systems to interact with specific on-premise systems. Unfortunately, many traditional IdM systems are not designed to operate outside of an enterprise firewall, or simply do not have adequate controls to interact with continually evolving cloud services (Musthaler, 2013). As a result, IT professionals must develop customized manual or partially automated processes to integrate cloud services into the IT infrastructure. These cloud services often have their own login systems and connector APIs that do not always work with internal/on-premiseIdM systems (Chickowski, 2013). 2.2. User Password Sprawl Once an identity is provisioned in a cloud system, sufficient credentials must be established to leverage it. The user must present these credentials to authenticate access to a system. The most frequently used form of credential is a username and password combination. Many organizations must comply with federal laws and regulations for securely managing user credentials. On-premise applications either have their own identity stores, or somehow leverage an existing identity store containing credentials. Cloud-based services often follow the same model. However, many organizations employ firewalls or other security controls to prevent external entities from accessing on-premise credentials. This presents an added challenge for integrating cloud services into existing IT infrastructures. A quick workaround to this problem is to simply provision a new identity and set of credentials in the cloud. More often than desired, organizations use this workaround to continue with rapid deployment of new cloud services. The end result is a sprawl of username and password combinations across many cloud services with users having to track these identities. According to Centrify, a popular IT Enterprise IDaaS provider, this has led to users writing down passwords on sticky notes or other easily accessible forms. These practices by users often result in increased security risk for the organization, and dissatisfaction among the user experience. This additional layer of identity management also creates administrative overhead that can overwhelm help desk managers and IT administrators(Centrify, 2015). 2.3. Auditing and Compliance Many organizations have an Information Security Policy document that employees must follow. This document defines security requirements for leveraging IT in an organization. The definitions are often derived from internal security requirements, and federal regulatory requirements such as Sarbanes Oxley and HIPAA. However, the existence alone of this document is not enough to reduce security risk. Users do not always comply with policies defined in these documents for various reasons such as lack of understanding, or willful disregard of the policies. This demonstrates the need for IT security compliance and auditing. These are also important components of Identity Management. Once an identity is established within a system, its access into critical data must be monitored. Audit policies and practices within systems allow activities to be tied to an individual’s usage. This reduces risks associated with fraud, theft, and other potential breaches of valuable information (Howarth, 2014). Most on-premise systems allow IT administrators to have granular control and visibility into raw audit logging data. However, cloud services do not offer the same functionality. Two common reasons for this are technical limitations by the cloud provider that make it not possible to share this information, or unwillingness by cloud provider to share this information. In general, terms and conditions offered by even IDaaS cloud providers are not equivalent to features offered by on-premise environments (Bedell, 2012). The feature disconnect in other cloud services without Identity Management as a focus is likely to be even greater. III. Solution The most commonly used approach to dealing with Identity Management issues in the cloud is to leverage on-premise Identity Management infrastructure as much as possible. This is an intuitive approach, which is likely to have the least overall cost in the long term, due to reduced risk of managing separate identities and avoiding unnecessary investments in extraneousIdentity Management processes or systems. There are also cloud-based solutions available that can integrate with on-premise systems, as well as operate primarily in the cloud. 3.1. SingleSign-On Identity Federation/Single Sign-On (SSO) has become widely adopted among organizations in recent years. It allows organizations to share identity and access information without actually transmitting copies of identity records and/or passwords. A widely used SSO system is Microsoft’s Active
  • 3. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 1 Issue 5 ǁ December 2016. w w w . i j m r e t . o r g Page 45 Directory Federation Services (ADFS). ADFS is included as a feature of the Windows Server operating system at no additional financial cost. It allowsorganizations to create federated trusts with SSO systems in other organizations. Many cloud providers, such as Microsoft’s Office 365, have seamless integration into ADFS. ADFS allows organizations to use credentials in existing Active Directory and LDAP directories. Leveraging on- premise credentials reduces the risksassociated with duplicating usernames and passwords across multiple systems. It also allows rapid deprovisioning and access control for users in cloud applications and services(Chickowski, 2013). Furthermore, on- premise audit logging systems still retain much of desired visibility into user access since authentication events occur on-premise. Companies such as Celestix provide tools to further enhance the native integration of ADFS and Office 365. Celestix Federated is a made-ready solution that allows seamless implementations of ADFS and integration into existing Identity Management infrastructure (Celestix, 2016). 3.2. Identity Synchronization & Proxy Another approach is to establish proxy services between on-premise identities and cloud providers. While identity federation / SSO can be viewed as a cloud Identity Management proxy system, it is different because it is built on industry standards that were designed to meet needs beyond Identity Management for cloud systems. Some vendors today provide proprietary systems that are specifically designed to integrate on-premise identities with their own cloud services. Microsoft provides a free identity proxy/synchronization system known as Azure Active Directory Connect. This tool is designed to synchronize on-premise Active Directory identities to Office 365 and Azure cloud services. It allows for user provisioning/deprovisioning, bi-directional password synchronization, and group filtering. While it is not security best practice to distribute user credentials to other systems, password synchronization does reduce the number of distinct passwords a user must track. Which in turn reduces the risk a user will carelessly write passwords down on sticky-notes or other unsecure media. Also, group filtering allows on-premiseaccess control to cloud based systems, as well as leveraging existing auditing infrastructure for compliance. Centrify offers an on-premise proxy service called Centrify Cloud Connector. This allows integration of on-premise identities in Active Directory to CentrifyIDaaS. This integration behaves as a true proxy. Identity datais not required to be synchronized to the cloud(Centrify, 2015). This eliminates the risk associated with user credential sprawl as it fully leverages existing on-premise Identity Management infrastructure. CentrifyIDaaS then bridges these identities into cloud services such as Office 365, and Google Apps for Work. 3.3. Identity as a Service (IDaaS) The most rapidly developing approach to managing identities in cloud computing is Identity as a Service. This solution has minimal to no interaction with on- premise Identity Management systems. In some cases, IDaaScan be the primary Identity Management system and/or provider for an organization. Identities are provisioned and managed in the cloud, then presented to on-premise resources as needed. PingIdentity provides an IDaaS solution called PingOne Directory. Identities are provisioned and managed in the PingOne Directory, and are made available via PingIdentity’s SSO services. PingIdentity integrates with many popular SaaS cloud service providers such as Office 365, Google Apps, Box, and Amazon Web Services(PingIdentity, 2016). The PingIdentity SSO service can then be leveraged by on-premise resources such as ADFS. While IDaaS is an emerging technology with a significantly different model than on-premise Identity Management systems, it shows promise for managing identities in the cloud. Unlike traditional IdM systems, IDaaS systems are being designed with a “cloud first” mentality. Organizations must be cautious in adopting IDaaS, as thorough testing and evaluation should be performed to ensure the desired IDaaS cloud service meets IT operational, administrative, and security requirements for the organization. IV. Conclusion Many organizations will continue to adopt cloud computing at an accelerated rate. This adoption will revolutionize how IT and business operations are conducted. However, the need for effective Identity Management remains constant. Cloud platforms present new challenges to Identity Management such as working around firewalls, while also demonstrating the need to address classic challenges. Effective user provisioning/deprovisioning and credential management process are still needed. Organizations must continue to comply with federal regulations for auditing and access of sensitive data. Classic solutions can be adopted to address the Identity Management challenges of cloud computing. New approaches such as IDaaS also present opportunities to supplement and/or improve IT industry standards for Identity Management. In the end, organizations must decide which Identity Management approaches best meet business needs.
  • 4. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 1 Issue 5 ǁ December 2016. w w w . i j m r e t . o r g Page 46 REFERENCES [1.] Bedell, C. (2012, November). Understanding IDaaS: The benefits and risks of Identity as a Service. Retrieved from TechTargetSearchCloudSecurity: http://searchcloudsecurity.techtarget.com/fea ture/Understanding-IDaaS-The-benefits- and-risks-of-Identity-as-a-Service [2.] Celestix. (2016). 5 Must-Know Benefits of Microsoft Active Directory Federation Services (ADFS). Retrieved from Celestix:http://www.celestix.com/5-must- know-benefits-of-microsoft-active- directory-federation-services-adfs/ [3.] Centrify. (2015, August 06). Stop Password Sprawl with App Single Sign-on via Active Directory. Retrieved from Centrify: https://www.centrify.com/media/1113447/w hitepaper-stop-password-sprawl-en.pdf [4.] Chickowski, E. (2013, October 25). Identity Management In The Cloud. Retrieved from InformationWeek DarkReading: http://www.darkreading.com/identity- management-in-the-cloud/d/d-id/1140751? [5.] Howarth, F. (2014, April 17). Identity Management in the Cloud: Top Tips for Secure Identities. Retrieved from SecurityIntelligence: https://securityintelligence.com/identity- management-cloud-tips-secure-identities- iam/ [6.] Musthaler, L. (2013, January 18). Identity and access management as a cloud-based service eliminates time, pain and cost. Retrieved from Network World: http://www.networkworld.com/article/21637 44/infrastructure-management/identity-and- access-management-as-a-cloud-based- service-eliminates-time-p.html [7.] PingIdentity. (2016). PingOne Directory. Retrieved from PingIdentity: https://www.pingidentity.com/en/products/pi ngone/directory.html [8.] Wlodarz, D. (2013, November 04). Comparing cloud vs on-premise? Six hidden costs people always forget about. Retrieved from Betanews: http://betanews.com/2013/11/04/comparing- cloud-vs-on-premise-six-hidden-costs- people-always-forget-about/