Identity Management Systems

Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.

2016 ◽  
pp. 129-155
Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.


2018 ◽  
Vol 9 (1) ◽  
pp. 63-78 ◽  
Author(s):  
Vikas Kumar ◽  
Aashish Bhardwaj

This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.


2021 ◽  
Vol 28 (1) ◽  
Author(s):  
O. Aweh ◽  
S.C. Chiemeke

Identity management concerns transcends technical design issues as users disposition, awareness and attitude play a vital role in the effectiveness of such systems. A framework that supported some important digital identity management system security related features was presented in a previous study. In this current study, an attempt to empirically demonstrate the functioning of these features and to access how user’s awareness, disposition and attitude impact on the proper functioning of such systems was undertaken. To achieve these, a system was modeled and implemented using object oriented analysis and design method. The developed system empirically generates forensic evidence and an implicit mutual authentication scheme. The resulting system developed was tested for these features. The results obtained showed that the framework did provide for reliable forensic evidence generation and it also provided for the implementation of an implicit form of mutual authentication scheme. However, the outcome of a brief test conducted to gauge the reliability of this implicit mutual authentication scheme showed that the support provided was not very reliable based on these users’ factors (awareness, attitude and deposition)


2020 ◽  
Vol 7 (1) ◽  
pp. 21-40
Author(s):  
Hasnae L'Amrani ◽  
Younès El Bouzekri El Idrissi ◽  
Rachida Ajhoun

Digital identity management with the metamorphosis of web services enforces new security challenges. A set of identity management systems exists to deal with these identities, alongside the goal of improving user experience and gain secure access. Nowadays, one faces a large number of heterogeneous identity management approaches. This study treated several identity management systems. The federated system makes proof of it eligibility for the identity management. Thus, the researcher interest is on the federated model. Since it consists of the distribution of digital identity between different security domains. The base of security domains is a trust agreement between the entities in communication. Federated identity management faces the problem of interoperability between heterogeneous federated systems. This study is an approach of a technical interoperability between the federations. The authors propose an approach that will permit inter-operation and exchange identity information among heterogeneous federations.


Sign in / Sign up

Export Citation Format

Share Document