Description
After reading chapter 15, describe how federated identity management will impact the processes behind identifying end users. The initial post must be completed by Thursday at 11:59 eastern. You are also required to post a response to a minimum of two other student in the class by the end of the week. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted.
Your responses to other students must be more than a simple "Good job" or "I agree with your post". They must also not just be "Let me add to your post..." Instead, your responses to each other should do three things:
1. Acknowledge the other student's post with some form of recognition about what they posted
2. Relate their posting to something you have learned or are familiar with
3. Add to the conversation by asking additional questions about their post, or discussing their topic further
POST 1
According to Rosencrance, L,2018. Federated Identity Management (FIM) is a digital management system that allows enterprises and big corporations with several different technologies used by the stakeholders such as corporate-owned IoT devices and BYOD devices as well as different applications related to business or personal use are logged in by using the same login credentials across different domains of the organization. It is a seamless process to make access easy for the registered users to access any domain without providing administrative user information. In such an establishment, the corporation must rely on a third-party Federated Identity Management service provider. Confidentiality and trust can be established between the service provider and the user by establishing Security assertation Markup language (SAML) or a similar XML establishment with the same standards.
The Federated Identity Management works this way; initially, users will register to the home network and further authenticate their identity through the home security domain. Once the user is authenticated via the home domain, it additionally logs into the identity federation remote application.
The current Federated Identity Management systems that exist in the market today are OpenID, OAuth2.0, Shibboleth. These software’s are developed using OASIS SAMIL (Security assertation Markup language).
The function of OpenID applications is to log in one time and access different applications that are tagged to the OpenID. Top shelf cloud providers power the OpenID. Leading organizations such as Google and Microsoft are planning to replace their current authentications systems with Federated Identity Management. (Rosencrance, L,2018)
According to Johann. Some of the given advantages of Federated Identity Management are it improves the privacy of the registered users and enables the organizations to comply with GDPR (General Data Protection Regulation) and CCPA (California Consumer Privacy Act) regulations. It eliminates the tedious process of registering several times over and over for new applications, network domains, and devices. (Johann. (2018, June 18)
POST 2
Federated identity management (FIM) is an arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group. The use of such a system is sometimes called identity federation.
Identity federation links a user's identity across multiple security domains, each supporting its own identity management system. When two domains are federated, the user can authenticate to one domain and then access resources in the other domain without having to perform a separate login process.
Identity federation offers economic advantages, as well as convenience, to enterprises and their network subscribers. For example, multiple corporations can share a single application, resulting in cost-savings and consolidation of resources.
How federated identity management works
Under a federated identity management scheme, credentials are stored with the user's identity provider -- usually the user's home organization. Then, when logging into a service such as a software-as-a-service app, that user does not need to provide credentials to the service provider: The service provider trusts the identity provider to validate the user's credentials. Consequently, the user only has to provide credentials directly to the identity provider, which is generally the user's home domain.
Under identity federation, the user authenticates once through the home domain; when that user initiates sessions in other security domains, those domains trust the user's home domain in order to authenticate the user (Chadwick, D. W. 2009).
Additionally, with identity federation, administrators can avoid some of the issues that go along with balancing multi-domain access, such as developing a specific system to make it easy to access the resources of an external organization.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
View attached explanation and answer. Let me know if you have any questions.
1
Chapter 15: Federated Identity Management (FIM)
Student’s Name
Institutional Affiliation
2
How does federated identity management impact the processes behind identifying endusers?
Federated identity management is where one organization can validate the identity of
a user from a third-party company that shares computer services or resources. For instance, a
web-based employer and an employee-benefit organization can use federated identity
management to allow one to access the employee's information using other's credentials. In
such a case, the employer retains the user identity data, while the employee-benefit agency
uses the recruiting organization's authentication details instead of each party having its own
user login details, including the associated costs. In other words, the user is only signed in
through one website, not multiple ones each time they need to log in.
Federated Identity Management surpasses the technical understanding of the
interaction between servers. That is, the technology and the organizational policies regulate
the service users and the reasons or purposes for the business (Aldini et al., 2009). Federate...