How to Federate Access & Identity Together for a Complete IdP
Learn how federating the identity sources behind your IdP can simplify the deployment and extend the scope of your SSO to multiple identity sources with support for smarter and richer attribute-based policies.
The world of access is expanding and federation is the new SSO standard. You’re no longer looking at just applications on premises, but also partner applications, SaaS applications, etc. The increasing complexity of connections between applications and identity/data stores becomes a hindrance to business initiatives, a threat to system-wide security, and a major headache for IT.
You might have already turned to federation standards such as SAML 2.X or OpenID Connect/OAuth 2.0 as a means to address these challenges. Federating access with standardized protocols focalizes and brings the access request to the door of the enterprise. But without a common identity integration layer behind your IdP, you will face multiple challenges due to the fragmentation of your identity sources across multiple silos.
You need a process that brokers authentication and provides attributes for customized, detail-rich security tokens. Fortunately, the same architectural design you use for access, the federation pattern, can apply to identity as well. By federating your identity information, you create an efficient foundation for optimally functioning federated access.
This webinar will focus on:
- How to streamline authentication, deliver SSO, and enrich authorization by combining federated access and federated identity
- How to simplify the creation of a common Identity Provider for fine-grained access with the support of complete global profiles and context-rich data
- How federation enables more contextual attribute-based policies through the support of keyword search across enterprise identity and data
Speaker: Wade Ellery, Senior Solutions Architect, Radiant Logic