Secure Your Access Now
A lot of IAM can be done by streamlining the way that an enterprises applications are authenticated, so the enterprise should look at using a central authentication mechanism for all of its users, according to Nicolai Solling, director of Technology Services at help AG Middle East.
“The authentication method could be a software token, which is a robust way of identifying an individual, and then make all applications use that token. That could get a lot of organisations to an advanced level of IAM compared to what they have today, because the individual does not have to remember 25 different identities, but just one,” says Solling.
Authentication has a number of standards for networks and applications, and companies must ensure their authentication solution complies to these standards. One of the most important in today’s IAM is Secure Assertions Markup Language (SAML), which allows access management vendors to provide federated authentication services for multiple enterprises that wish to use one another’s applications and data.
“Access has traditionally focused on physical access, which was dominated by HID prox, but that has given way to more innovative solutions like NFC,” explains Ray Wizbowski, international technology marketing executive, Gemalto.