BYOI and the way forward
When we look at how things are evolving and changing with the consumerization of IT, it is likely that we are going to have to continue to assess how to utilize both SSO and social identity frameworks support business objectives.
We want to achieve verifiable identity based upon unique identities, within the given context of what those identities are seeking to access, from where, when and with what device. Therefore, social identity may provide the first step in authenticating an individual, but would need to be part of a process of secure and scalable authentication.
It may be that it is all that is required to access some services, or be part of a multi-factor authentication approach to really verify identity in order to access other, more sensitive data.
As social identity becomes more ubiquitous, we are already entering the era of “Bring Your Own Identity” (BYOI), where user identity is decoupled from traditional control, while businesses have the ability to rapidly provision, deprovision and manage individual access of data across public and private cloud services.
For CIOs that can get past these entrenched myths, and apply SSO in light of today’s disruptive IT trends, such as cloud, consumerization of IT, mobile and of course, social Identity, SSO’s long track record as a proven technology and solution offers additional layers of protection to existing identity and access solutions for comprehensive access authentication that circumvents the weakest link – humans who have challenges remembering dozens of user names and passwords. Perhaps most importantly, it strengthens today’s move towards far more comprehensive data protection measures to meet business and compliance demands.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.