Visit My Centric Blogs:
Using Windows Virtual Desktop for Remote Work (March 18 2020)
Planning IAM’s Success for Enterprises and Consumers in Cloud and Digital Transformation Era— We discuss how IAM looked a decade ago and then how Federation delegates authentication and removes the siloed app authentication repositories.
Using Claim Based Authentication for Identity and Access Management— We explore Claim Based Authentication (CBA) in more detail. We talk about token, claims, and discussed the types of applications. We also note that CBA is more complicated by implementation but is also more secure than authentication mechanisms of the past.
Using Microsoft for Hybrid Identity Options in Your IAM Environment— We look at Microsoft’s hybrid identity stack to point out modern identity’s complexity, and the challenges organizations face today. We concluded that the answer to handling the complexity requires a thoughtful and well-designed approach for any IAM project.
Addressing the Complexity of IAM Solutions for Organizations— We address why assessing your IAM environment is one of the most critical tasks in today’s digital transformation era. It is essential that enterprises design, configure, and architect their modern IAM solutions per Identity standards and make sure that they secure their design.