Cloud computing key driver for new identity rules: expert

The Jericho Forum’s new guidelines for designing better identity systems are timely because of cloud computing, according to Forum president Paul Simmonds.

The Jericho Forum has this week published a set of principles, the Identity, Entitlement and Access Management (IdEA) Commandments, to promote open and interoperable standards that can be used to help build identity management processes that can work on a global, de-perimeterized basis.

The Jericho Forum works to define and promote solutions on the issue of de-perimeterization, which is becoming more widespread as organisations want to collaborate more.

“True cloud is the most extreme case of a de-perimiterized world, so cloud is definitely one of the major drivers [for the identity commandments],” said Simmonds.

“If you can make it work in the cloud environment, it will work better anywhere else.”

User or resource-centric identity management is cheaper, more scalable and more secure than traditional application or system-centric identity and access management, according to the Jericho Forum.

“Passwords are broken,” Simmonds said.

“Core identity has to be under the user’s control if it is going to work for the internet age, and to implement it, you have to support identity access management and asset management. Both of those we do wrong at the moment, and we have been doing it wrong for too long.”

Simmonds said that existing technologies for identity were purely stopgap solutions, and did not really solve the problems of managing identity in a global, collaborative and de-perimeterized environment.

The root of the problem is that current authentication systems are designed for computers, not humans, he said, and that federating existing identity access management systems was not scalable.

“There are lots of people trying to provide sticking plaster solutions because identity is broken,” he said.

Furthermore, Simmonds said that providing a ‘super persona’, for example, through a national ID card scheme, was dangerous.

“The problem is your super persona then becomes a pseudo-core identity, and you’re back to a core identity you don’t manage. It’s a really bad idea,” he said.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now