The document outlines the importance of Identity and Access Management (IAM) in ensuring secure access to resources in cloud environments. It describes the architecture of IAM, which includes components such as Cloud Resource Provider, Identity Management, Policy Management, and Resources Engine with Policy Decision-making. Key functions of IAM include identity provisioning, authentication, authorization, and policy management, emphasizing the principle of least privilege for access control.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
4 views10 pages
Lecture6 IAM Architecture
The document outlines the importance of Identity and Access Management (IAM) in ensuring secure access to resources in cloud environments. It describes the architecture of IAM, which includes components such as Cloud Resource Provider, Identity Management, Policy Management, and Resources Engine with Policy Decision-making. Key functions of IAM include identity provisioning, authentication, authorization, and policy management, emphasizing the principle of least privilege for access control.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10
IAM Architecture
Y. V. Lokeswari AP / CSE SSN College of Engineering Identity & Access Management
• Security in any system involves primarily ensuring that
the right entity gets access to only the authorized data in the authorized format at an authorized time and from an authorized location. • Identities, trust, authentication and access controls have obtained additional significance in the cloud world. • Identity and access management (IAM) is of prime importance in this regard. • Identity and Access Management (IAM) is used to manage access to resources by assuring that the identity of an entity is verified, then granting the correct level of access based on the protected resource. Identity & Access Management
• Identity and access management is a critical function for
every organization, and a fundamental expectation of SaaS customers The principle of least privilege states • “Only the minimum access necessary to perform an operation should be granted, and that access should be granted only for the minimum amount of time necessary”. • The advent of cloud services and services on demand is changing the identity management landscape. • Most of the current identity management solutions are focused on the enterprise and typically are architected to work in a very controlled in static environment Identity & Access Management
1. Cloud Resource Provider (CRP) : The resource provider
is responsible for providing access to resources based on user’s asserted identity and privilege.
•Cloud resources : involve software, operating systems or
even programming environment and network infrastructure. •User upload resources are mainly user-generated resources and upload their own resources to the cloud, which provide the data access to the users. Identity & Access Management Architecture
2. Identity Management (IDM) : IDM is responsible for
managing users and their identities, issuing credentials, vouching for the user's identity and identity assertion. It provides two external services: • Multi-factor Authentication Service: is the interface provided by IDM to validates the asserted identity information. •The authentication services evaluate credentials such as user name and password, secure ID token pass phrases, X.509 certifications, and so on, directly provided by the user. • Identity Information Inquiry Service: is the interface provided by IDM to check the identity information for user authorization. Identity & Access Management Architecture
access rules that associate users with resources. Policy management supports 5 functions: 1. Attribute Management 2. User authorization 3. Resource management 4. Access policy management : Access Policy Management defines access rules of cloud resources and users own resources. 5. Policy Inquiry Service : Policy Inquiry Service is available to query the user privileges and according to resource access policies, decide whether to allow users to access Identity & Access Management Architecture
4. Resources Engine and Policy Decision-making(REPD) :
scheduling of resources within cloud. This component is responsible for finding resources that meets the requirements of the user among the list of resource.
determines whether to allow users to access appropriate resources by assuring security. It takes the help of IDM and Policy Management component. References
• Yang, Yan, Xingyuan Chen, Guangxia Wang, and Lifeng
Cao. "An Identity and Access Management Architecture in Cloud." In Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on, vol. 2, pp. 200-203. IEEE, 2014.