All Research
Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications are hard and costly to migrate. Thus, Identity Services must work well for all these applications and the entire hybrid IT infrastructure. While they increasingly run from the cloud, as IDaaS (Identity as a Service), connecting back to on-premise applications and delivering comprehensive IAM capabilities for hybrid IT becomes essential. Oracle Identity Cloud Service is built for these environments, with specific strengths for the full breadth or Oracle business applications.

Commissioned by Oracle

1 Introduction

Cloud services have become a reality for most businesses over the past few years. For most businesses, “cloud first” has become the norm, not the exception. As a result, more and more of the business workloads are shifting to the cloud, into as-a-service deployment models. This has created hybrid business systems for most organizations.

This evolution requires other IT services such as IAM (Identity and Access Management) to follow this trend. This critical authentication service should run wherever critical applications run that need to be supported and protected. There is no way to split identity services into disparate services for the “old” and “new” IT. There is a need for a hybrid IAM. While this tended to be an on-premises IAM with some support for cloud services, it is about to shift to cloud IAM with strong support for existing on premises business services with more and more business workloads shifting to the cloud.

Over the past years, a growing number of IDaaS (Identity as a Service) solutions have appeared on the market. However, many if not most of these are focused on some part of IAM, which is supporting Single Sign-On (SSO) of users and adaptive authentication schemes. Unfortunately, IAM is not done by authenticating a user. It is about managing the identities and their entitlements, it is about authenticating, and it is about authorizing access. IDaaS services that are just SSO and authentication services lack the depth that is required for successfully securing and governing business applications.

However, as the shift of business workloads is a long-term journey for most businesses, moving from on-premises IAM to IDaaS while delivering comprehensive support for IAM capabilities across all target systems, independent of their deployment model, is a multi-step journey as well.

Many of today’s investments into IDaaS don’t follow a well-thought-out strategy but are tactical: there appear some new cloud services, thus connectors or SSO are added. However, when looking at the mid-term IT strategy (commonly a “cloud first” or “cloud preferred” approach) and the mid-term IT reality, which is hybrid for most organizations, a well-planned approach must be taken.

Part of this approach is to start with a clear focus on and acceptance of the hybrid reality of IT. While “cloud first” might be the strategy, the reality is different. Moving to an “IDaaS first” approach is a consequent in the shift to as-a-service models. Thus, businesses need to decide when to best make this step and how.

Oracle Identity Cloud Service (IDCS) provides, together with additional offerings in the field of security and identity, a broad range of options for customers on their journey to the cloud. A specific strength is the level of integration with Oracle business applications and databases, which make IDCS a strong fit for these organizations.

Full article is available for registered users with free trial access or paid subscription.
Log in
Register and read on!
Create an account and buy Professional package, to access this and 600+ other in-depth and up-to-date insights
Register your account to start 30 days of free trial access
Get premium access
Choose a package

Stay up to date

Subscribe for a newsletter to receive updates on newest events, insights and research.
I have read and agree to the Privacy Policy
I have read and agree to the Terms of Use