Identity Management
Centralised identity and access management with single sign on and role base access controlled policies and permissions.
Last updated
Was this helpful?
Centralised identity and access management with single sign on and role base access controlled policies and permissions.
Last updated
Was this helpful?
To access modern infrastructure as a service or cloud it requires “Identity Management” to ensure
Systems are protected, both logically and physically, against unauthorised access.
Easy of Access.
Ease of Onboarding and Offboarding Users.
These can be fulfilled through
On stop station for change management, tracking, tracing.
Centralised User Management.
Standard Access Control Policies and Permissions.
So far we have learnt about the 3 core factors Network, System and Storage which constitute the foundation of modern infrastructure. For secure and seamless access to this infrastructure you need:
Access to the core infra i.e network, systems and storage must be integrated with this centralised Identity Management setup, so there is a one stop station for authenticating and authorising access.
Don’t use anonymous/generic credentials.
Reset all default system or software passwords.
Do not transmit credential in plain text.
Do not store credentials on machines or static files.
Do not share credentials like vpn profile, access tokens, root account.
Do not keep temporary credentials longer.
Do not communicate credential through emails, chats etc.
Centralised Identity Provider and secrets management.
SSO for ease of access, onboarding and off -boarding.
Logically segregated Role Based Access Controlled authorisation for systems.
Well defined policies and permissions for each role.