Skip to main content

Hitachi ID certification

Product Sites

The Intersection of Identity Management and Cloud Computing

This document is a comprehensive analysis of all the ways that Identity and Access Management (IAM) solutions can be run in and integrate with cloud computing systems.

Both cloud computing and IAM are relatively new, so the first part of this document defines key concepts and terminology. Next, assumptions that clarify the scope of this document in terms of network topology and functionality are presented and finally a comprehensive list of architectural scenarios are presented, along with an analysis of the costs, risks and benefits of each scenario.

Table of contents:

  
1Introduction
2Background: Cloud Computing and IAM
2.1The term ``cloud''
2.2Overview of cloud computing
2.2.1SaaS, PaaS, IaaS
2.2.2Private, community, public and hybrid clouds
2.2.3Cloud vendors
2.2.4Examples of public cloud vendors
2.3Overview of identity and access management
2.3.1Identity administration vs. runtime access control
2.3.2Identity administration services
2.3.3Access control services
3Benefits of Cloud Computing
3.1Lower, predictable costs
3.2Capital vs. operating cost
3.3Expertly managed systems
3.4On-demand availability
3.5Faster provisioning
4Drawbacks of Cloud Computing
4.1Control and dependence on third parties
4.2Privacy and security
4.3Regulatory compliance
4.4Flexibility and customization
4.5Reliability and connectivity
4.6CSP business viability
4.7Service level agreements
5Network Architecture of Cloud Computing
6The Intersection of Cloud Computing and IAM
6.1Identity as a service (IDaaS)
6.2Scenario analysis: identity administration and cloud computing
7Summary
AScenario Analysis: Identity Administration and Cloud Computing
BScenario Analysis: Privileged Password Management
B.1Backup vault in the cloud
B.2Securing administrative access to cloud infrastructure

Please register

Access to this document requires registration. Please fill in the form below. The full document will be e-mailed to you automatically.



Information
Your company/organization name:
Your name
Your title
Your work telephone number:
Your work e-mail address:
Total number of users in your company:
Please check the information you entered above before continuing.
Click to continue:
page top page top