Cloud computing key driver for new identity rules: expert

The Jericho Forum’s new guidelines for designing better identity systems are timely because of cloud computing, according to Forum president Paul Simmonds.

The Jericho Forum has this week published a set of principles, the Identity, Entitlement and Access Management (IdEA) Commandments, to promote open and interoperable standards that can be used to help build identity management processes that can work on a global, de-perimeterized basis.

The Jericho Forum works to define and promote solutions on the issue of de-perimeterization, which is becoming more widespread as organisations want to collaborate more.

“True cloud is the most extreme case of a de-perimiterized world, so cloud is definitely one of the major drivers [for the identity commandments],” said Simmonds.

“If you can make it work in the cloud environment, it will work better anywhere else.”

User or resource-centric identity management is cheaper, more scalable and more secure than traditional application or system-centric identity and access management, according to the Jericho Forum.

“Passwords are broken,” Simmonds said.

“Core identity has to be under the user’s control if it is going to work for the internet age, and to implement it, you have to support identity access management and asset management. Both of those we do wrong at the moment, and we have been doing it wrong for too long.”

Simmonds said that existing technologies for identity were purely stopgap solutions, and did not really solve the problems of managing identity in a global, collaborative and de-perimeterized environment.

The root of the problem is that current authentication systems are designed for computers, not humans, he said, and that federating existing identity access management systems was not scalable.

“There are lots of people trying to provide sticking plaster solutions because identity is broken,” he said.

Furthermore, Simmonds said that providing a ‘super persona’, for example, through a national ID card scheme, was dangerous.

“The problem is your super persona then becomes a pseudo-core identity, and you’re back to a core identity you don’t manage. It’s a really bad idea,” he said.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Empowering the hybrid workforce: how technology can build a better employee experience

Across the country, employees from organizations of all sizes expect flexibility...

What’s behind the best customer experience: How to make it real for your business

The best customer experience – the kind that builds businesses and...

Overcoming the obstacles to optimized operations

Network-driven optimization is a top priority for many Canadian business leaders...

Thriving amid Canada’s tech talent shortage

With today’s tight labour market, rising customer demands, fast-evolving cyber threats...

Staying protected and compliant in an evolving IT landscape

Canadian businesses have changed remarkably and quickly over the last few...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now