System Application and User Management, Cloud Computing Assignments

User Generated

Grzcre2016

Computer Science

Description

Q1. Pick one of the options for this week's discussion:

·  Explain the concept and application of federated identity. How is it used with cloud services?  What cloud services use federated identity?

·  What are the challenges, requirements and solutions for Identity Provisioning with SaaS, IaaS, and PaaS?

·  Compare and contrast IAM standards and protocols (OAuth, SAML, OpenID, FIDO).  Which have gained the most in popularity and use?  How are they used within organization's implementation of cloud services? 

·  Research two-factor authentication (TFA) and multi-factor authentication (MFA). How and where is it being used by CSPs?  What benefit does it provide?  At what cost? 

Requirement: 1 – 2 pages.


Q2. Read the article on "Identity and Access Management : IAM Architecture and Practice", and review Figure 1

 below.  



Figure 1. Enterprise IAM functional architecture (source: http://mscerts.wmlcloud.com/programming/identity%20and%20access%20management%20%20%20iam%20architecture%20and%20practice.aspx)

  In your paper for this week, answer the following: What major blocks of this diagram are now offered as a cloud service? Of those services, which do you think is less likely to be adopted by organizations? Of those services, which do you think is more likely to be adopted by organizations? Does your opinion depend upon the type of company? For instance, if the company is highly regulated or has high risks, cloud services may not be an option. Basically, this week you need to analyze how Enterprise IAM functions works with cloud services. Include at least one additional reference not included in the weekly reading.

Requirement: 2 – 3 pages

Deadline:

Q1 – 16 Hours

Q2 – 2 Days.


Unformatted Attachment Preview

Approve user authorizations based on roles/rules User life cycle User management (2) Authorization management (3) Authentication management (1)! Employees, suppliers partner, customers, etc. Authorization model Contract Authoritative sources User management services Desired state Authentication management services Data management and provisioning (5) Provisioning services, data management services (manual/automated) Monitoring services Auditing services Access management services Reporting services Actual state Access Federation management (4) Systems and applications Monitoring and audit (6)
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags