Secure, Collaborative IAM
Combined Session
Friday, June 07, 2024 13:30—14:30
Location: B 07-08
Friday, June 07, 2024 13:30—14:30
Location: B 07-08
Do you find yourself chasing down data files for disconnected apps? Yes, we all want fully bidirectional apps…But what about those “file” apps. Learn how to modernize the file collection and ingestion for your IGA Solution by empowering disconnected app owners to upload and pre-validate user and entitlement data on recurring schedules. Don’t fool yourself that your deployment will be the exception. Join Aquera, a 2022 Gartner “Cool Vendor” in Identity-First Security, to learn how to automate this process with improved file integrity, visibility on collection status through a central dashboard, and centralization of audit evidence data.
The proliferation of micro-services along with the changing threat landscape means it is no longer possible to rely on network segmentation to establish a secure permitter while allowing broad access between services inside the perimeter. As a result, we have to assume that the attackers are inside the perimeter and apply fine grained authorization at the microservice level to ensure least privilege access based on the context of each transaction. This context includes details of the transaction, the user, other services, or workloads in the call chain as well as the trust domains in which the services operate.
The good news is that there are two new complimentary standards being developed in the IETF OAuth working group that provide a standardised mechanism for preserving transaction context. The Transaction Tokens draft provides a mechanism for preserving context for fine grained authorization decisions within a trust domain, while Identity Chaining across Trust Domains provides a mechanism for preserving that context even when crossing trust boundaries. In this session we will provide an overview of these two emerging standards and describe how they are used to enable fine grained authorization in microservices.
Collaborative Networks have been widely used in business models for modern manufacturing to support today’s fast-moving innovations and complex supply chains. Managing different levels of trust efficiently and securely in Collaborative Networks is critical for productization and time-to-market.
Enabling trust in digital interactions requires the right balance between security and user experience. By combining the lessons learned from the user experience of consumer identity; mission-critical identity proofing and identity validation in financial services; and data privacy regulation compliance across regulated markets, a brand new approach of secure identity management across all industries has been on the rise.
Collaborative Networks (suppliers, partners, distributors, brokers etc.) have a very diverse set of users with varying security, privacy and user experience needs. Discover how to strike that balance to harness the true power of collaboration!