Short note on Identity as a Service (IDaaS).

 IDENTITY-AS-A-SERVICE (IDAAS)

  • Identity as a Service (IDaaS) is a third-party authentication infrastructure that is designed, hosted, and maintained by a service provider. IDaaS may be thought of as a cloud-based single sign-on (SSO). A business IDaaS is often acquired as a subscription-based managed service. A cloud service provider may also charge a subscription to host apps and give users role-based access to certain programs or even full virtualized desktops via a secure portal.
  • Employees at a corporation must log in to the system to execute numerous duties. These systems may be hosted on a local server or in the cloud. 
  • The following are some of the issues that an employee may encounter:
  1. Keeping track of various login and password combinations for accessing many servers. 
  2. When an employee quits the organization, it is necessary to disable all of that user's accounts.
  • To address the aforementioned issues, a new technology called Identity-as-a-Service evolved (IDaaS). As a digital entity, IDaaS manages identification information. This identity can be used for online transactions. Identity-as-a-Service- to solve the identity problem, the service essentially leverages the SaaS model and provides single sign-on for web applications, strong authentication and federation across boundaries, integration with internal identities, and identity monitoring, compliance, and management tools and services as appropriate.
  • The more cloud services you use, the more IDaaS you require, which should also include governance, management, and compliance (GRC) as part of the service. GRC is a growingly recognized phrase that represents a new method for enterprises to take an integrated approach to these three areas. However, this risk phrase is frequently used to describe a single business activity when, in reality, it encompasses many overlapping and related activities, such as internal audits, compliance programs such as Sarbanes-Oxley, enterprise risk management, and operational risk, and incident management.

Gartner defines IDaaS as, "a predominantly cloud-based service in a multi-tenant or dedicated and hosted delivery model that brokers core identity governance and administration (IGA), access and intelligence functions to target systems on customers' premises and in the cloud." Gartner states the core aspects of IDaaS as:

IGA: Provisioning of users to cloud applications and password reset functionality.

 Access: User authentication, Single Sign-On (SSO), and authorization supporting federation standards such as SAMI.

Intelligence: Identity access log monitoring and reporting.


Identity

The term "identity" refers to a set of characteristics that are connected with something for it to be recognized. Although all things may share the same qualities, their identities cannot be the same. The unique identification feature is used to provide a unique identity. Several identification services are used to authenticate services such as websites, transactions, transaction participants, clients, and so on. The following services may be provided as part of the Identity-as-a-Service:

  • Directory services
  • Federated services Registration
  • Authentication services Risk and event monitoring
  • Single sign-on services Identity and profile management


Comments

Popular posts from this blog

Suppose that a data warehouse for Big-University consists of the following four dimensions: student, course, semester, and instructor, and two measures count and avg_grade. When at the lowest conceptual level (e.g., for a given student, course, semester, and instructor combination), the avg_grade measure stores the actual course grade of the student. At higher conceptual levels, avg_grade stores the average grade for the given combination. a) Draw a snowflake schema diagram for the data warehouse. b) Starting with the base cuboid [student, course, semester, instructor], what specific OLAP operations (e.g., roll-up from semester to year) should one perform in order to list the average grade of CS courses for each BigUniversity student. c) If each dimension has five levels (including all), such as “student < major < status < university < all”, how many cuboids will this cube contain (including the base and apex cuboids)?

Describe how cloud computing technology can be applied to support remote ECG monitoring.

Explain market-Oriented Cloud computing architecture.