
IAM without borders: Identity Fabric breaks down silos and strengthens security
An Identity Fabric architecture combines core IAM areas. What are the advantages of this concept and how can it be implemented?
Topic
When & Where
Details
Format:
Technology lecture
Language:
German
Session description
Identity & Access Management (IAM) has been facing a central challenge for years: how can fragmented authorization structures be managed efficiently and securely across a large number of heterogeneous systems? IGA solutions are primarily concerned with processes relating to the user lifecycle and governance, i.e. adherence to compliance requirements and audit specifications. PAM systems protect privileged access, and access management solutions regulate authentication processes. Each of these disciplines is specialized and fulfills an important task - but they often act in isolation and create new silos.
What if these individual solutions worked together rather than side by side? What if authentication, authorization and governance were seamlessly integrated - across all syste ...