Tag

IAM

0 views collected around this technical thread.

DevOps
DevOps
Oct 7, 2023 · Information Security

Best Practices for User and Permission Management in DevOps/SRE

This article outlines essential DevOps/SRE best practices for user and permission management, including creating individual accounts, dedicated service accounts, minimizing privileged access, using roles, rotating credentials, applying the principle of least privilege, separating environment permissions, enforcing strong passwords, multi‑factor authentication, and enabling audit logging.

DevOpsIAMbest practices
0 likes · 26 min read
Best Practices for User and Permission Management in DevOps/SRE
Architects Research Society
Architects Research Society
Jun 15, 2023 · Information Security

Understanding Federated Identity Management: Concepts, Roles, Benefits, and Use Cases

Federated identity management enables users to access multiple applications across trusted domains using a single digital identity, detailing its core roles, benefits, inbound/outbound federation, account linking, just‑in‑time provisioning, home‑realm discovery, and its use as an IAM transition strategy.

IAMSingle Sign-Onaccount linking
0 likes · 15 min read
Understanding Federated Identity Management: Concepts, Roles, Benefits, and Use Cases
Architects Research Society
Architects Research Society
Jun 14, 2023 · Information Security

Understanding CIAM: Customer Identity and Access Management and the UMM Solution

The article explains the concept of Customer Identity and Access Management (CIAM), its importance for public‑facing applications, key features, industry trends, Gartner insights, and compares major CIAM solutions—including the UMM offering—highlighting functional coverage and deployment options.

CIAMIAMIdentity Management
0 likes · 14 min read
Understanding CIAM: Customer Identity and Access Management and the UMM Solution
Java Architecture Diary
Java Architecture Diary
Mar 13, 2023 · Information Security

Why MaxKey Stands Out as a Leading Open-Source SSO Solution

MaxKey is an open-source, Apache-licensed SSO platform that supports major authentication protocols, offers extensive login methods, provides multi-tenant IAM features, and includes detailed Linux deployment steps with code snippets and interface screenshots, making it a comprehensive solution for enterprise identity management.

AuthenticationIAMJava
0 likes · 6 min read
Why MaxKey Stands Out as a Leading Open-Source SSO Solution
AntTech
AntTech
Jun 21, 2022 · Information Security

Zero Trust Security Model and Technical Architecture for Ant Financial Office

This article examines the evolution from traditional perimeter‑based security to zero‑trust models, compares their advantages, presents industry case studies, and details Ant Financial’s integrated zero‑trust architecture—including SDP, IAM, and micro‑segmentation—along with implementation practices and future outlook.

Enterprise SecurityIAMMicro Segmentation
0 likes · 17 min read
Zero Trust Security Model and Technical Architecture for Ant Financial Office
IT Architects Alliance
IT Architects Alliance
Jun 19, 2021 · Operations

Reference Architecture for Digital Transformation Platforms

The article outlines a comprehensive reference architecture for digital transformation platforms, detailing typical organizational contexts, desired outcomes, and key components such as integration layers, API gateways, IAM, BPM, observability, multi‑region deployment, and development practices to enable seamless, secure, and scalable business services.

API GatewayDigital TransformationIAM
0 likes · 10 min read
Reference Architecture for Digital Transformation Platforms
Bitu Technology
Bitu Technology
Apr 14, 2020 · Information Security

Okta & AWS Integration Configuration Guide: Using SAML and STS for Secure Access

This guide explains how to replace static AWS IAM credentials with secure, time‑limited access by integrating Okta SSO via SAML, configuring the necessary Okta application, AWS identity provider, IAM roles, and using bash scripts to obtain temporary STS credentials for authenticated AWS operations.

AWSIAMOkta
0 likes · 13 min read
Okta & AWS Integration Configuration Guide: Using SAML and STS for Secure Access
Efficient Ops
Efficient Ops
Jul 18, 2019 · Information Security

How DevOps Can Tackle the Growing Wave of Cloud Security Challenges

The article summarizes Chen Weijia’s DevOps International Summit talk on confronting expanding cloud security threats, covering DevSecOps practices, code scanning tools, encryption strategies, permission segmentation, and unified identity management to balance efficiency and security in modern software delivery.

CI/CDCloud SecurityDevOps
0 likes · 13 min read
How DevOps Can Tackle the Growing Wave of Cloud Security Challenges
Beike Product & Technology
Beike Product & Technology
Sep 30, 2017 · Information Security

Design and Implementation of OpenIAM: A Cloud Identity and Access Management Service Inspired by AWS IAM

The article describes the challenges of resource isolation and permission management in a microservice environment, explains AWS IAM concepts and policies, and details the design, development, and expected benefits of the internally built OpenIAM service for unified authentication and authorization across services.

AWSCloud SecurityIAM
0 likes · 9 min read
Design and Implementation of OpenIAM: A Cloud Identity and Access Management Service Inspired by AWS IAM