Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Networking

    How to Unify Identities to Reduce Identity and Access Management Challenges

    Written by

    Jackson Shaw
    Published April 28, 2009
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Today’s complex, heterogeneous enterprises contain multifaceted and diverse information systems. The proliferation of the personal computer and the networking of those computers have caused the number and types of systems that are accessed, as well as the number of employees who must be granted access, to grow exponentially.

      An enterprise may use any combination of Windows, Unix, Linux, Macintosh or legacy systems-each running a variety of applications and creating significant inefficiency because users must remember different passwords and take the time to access each one separately.

      System security demands that authentication, authorization and administration be controlled for every identity of every user in the enterprise. This creates the majority of identity and access management challenges. In a complex, heterogeneous enterprise, the IT staff spends countless hours provisioning, de-provisioning and dealing with password management and other issues for each of these user identities.

      These same factors impact the organization’s ability to maintain information security as required by government regulations, industry initiatives and established best practices frameworks. In fact, inconsistent password policies throughout the enterprise, non-secure authentication practices and delays in user de-provisioning-due to a mix of systems and IT teams with the authority to deactivate a user account-are the most common causes of compliance deficiencies.

      Simplifying identity and access management

      Several approaches or strategies exist to address these challenges. The security framework approach implements a framework around the entire environment, imposing structure on the disparate identity infrastructure.

      Often called meta-directories or virtual directories, these security frameworks implement a master directory to which all other directories are synchronized. Among the drawbacks to the security framework, however, is its inability to unify each identity in a heterogeneous environment.

      The point solution approach addresses individual cases as they occur, devising solutions and implementing technologies designed to solve the specific problem. The drawback here is that the solution usually fits the specific system for which it is designed, while a similar problem in another system would require an additional solution.

      Custom development is another option. With enough time and effort, custom-developed solutions will integrate any components. Standards exist and tools are available to enable an organization to integrate its Unix systems with Active Directory. However, on the down side, these projects usually prove too complex, time-consuming and expensive to be viable for a large, complex organization.

      Relying on the status quo is the reality for which many organizations opt when faced with identity and access management challenges. They make do with what they have, perhaps in combination with point solutions and custom-developed solutions.

      “Get to one” strategy is the best of all worlds

      One strategy stands out above the rest. A “get to one” strategy not only combines the best of all the previously mentioned solutions, it also avoids many of their shortcomings. A “get to one” strategy will have the extensive and robust capabilities of the security framework, the targeted functionality of the point solution, the forward-looking innovation of the custom approach, and the cost-effectiveness of maintaining the status quo.

      Since most identity and access management challenges stem from the complexity and disparity of the modern heterogeneous enterprise, eliminating these myriad identities, authentication practices, roles, policies and processes is the quickest path to more efficient, controlled and compliant identity and access management.

      A good “get to one” solution will literally consolidate directories, automate identity administration from a single point, extending it to all unified systems and leverage an organization’s existing investments in identity infrastructure-in most cases, Microsoft Active Directory-to create truly unified identity and access management that crosses platform boundaries.

      With one identity, one point of management, one set of policies and one secure and strong authentication mechanism, all the identity management projects-single sign-on, provisioning, password management, directory consolidation, strong authentication, role management and audit/compliance-will be simplified.

      With fewer identities to manage and administer, the efficiency improvements and cost savings both for users and IT staff will be immediately apparent. The ability to implement single sign-on will improve user productivity by eliminating the number of times users must log on, as well as the downtime that occurs when a forgotten password prevents them from logging on.

      With fewer accounts to manage and fewer passwords to reset, IT staff can focus on more important tasks. In addition, IT’s manual management of user identity is greatly reduced when identity administration tasks are automated.

      Enhance security and achieve compliance

      The “get to one” approach enhances security by providing a more consistent and controllable environment from which security principles can be established and enforced. It also strengthens authentication for systems and applications pulled into Active Directory, providing for traditional multi-factor authentication solutions to be implemented consistently across the entire newly-unified enterprise.

      Finally, a “get to one” solution will empower organizations to achieve compliance by unifying previously non-compliant platforms into the inherently-compliant Active Directory infrastructure. It will enable the enterprise to implement strong authentication for both Windows and non-Windows systems.

      It will also provide powerful auditing and reporting tools to collect and distribute information from a central identity repository, based on the unified identity in Active Directory.

      The key is to unify identities completely. In reality, some systems or applications cannot have their identity subsystems fully unified within the existing infrastructure, so in those cases, a “get as close to one as possible for as many systems as possible” approach still can provide good opportunities to simplify identity and access management, and to obtain improved efficiency and enhanced security and compliance.

      Jackson Shaw
      Jackson Shaw
      Jackson Shaw is Senior Director of Product Management for Identity and Access Management at Quest Software. Jackson joined Quest as part of its acquisition of Vintela. He oversees product direction, strategy and go-to-market activities for Quest. Prior to Quest, Jackson was a key member of the identity and access management marketing team for the Windows server marketing group at Microsoft. He was responsible for product planning and marketing for Microsoft's identity and access management products, including Active Directory and Microsoft Identity Integration Server (MIIS) 2003. Jackson has been involved in directory, meta-directory and security initiatives for 20 years. He has spoken at various industry events and writes a popular identity management blog.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×