My take on the perfect IGA product

Disclaimer: Use any op the pictures or text in this post freely as long as you credits the author.

Previously I have written an article: Why Identity Governance first. In that one I advocated for having every data source importing data not directly to Identities, but always being subject to analytics. This requires the right tool of the right architecture. I have tried drawing that in two graphics I will share here. First is the general archirecture, and the next how Identity lifecycle could be implemented in this model.


No alt text provided for this image
Here any given endpoint - indescrimently - is import to and writes from, its own isolated "container".

The above demonstrates how no data import should ever mess up with any other end point, than the one providing bogus data, as data flow is only allowed between endpoints if the right conditions are present.

No alt text provided for this image
Identity data is flowing in and out (Eg: writebacks to HR with for example Email, userid and phonenumber) of the identity repository only if allowed.

Identity data is flowing from an HR system, but any deviations from expected format, data syntax, agreed HR processes and virtually any other filtering you can imagine made on data, combination of data and constellation of data, is caught and held back for further actions. Actions can be any type and shape, however it allows any organisation to avoid unpleasant surprises or damaging HR operations. Further it allows for the IGA platform to be self healing and report on all deviations from Identity policies.

要查看或添加评论,请登录

Kevin Kruse的更多文章

  • From Complexity to Clarity - Principle-Based Governance and the Role of Local AI

    From Complexity to Clarity - Principle-Based Governance and the Role of Local AI

    In a world of increasing complexity, where AI and automation drive continuous change, organizations face a critical…

    13 条评论
  • The missing compliance logic in all IGA products

    The missing compliance logic in all IGA products

    So I claims that basically all IGA products has a missing feature or governance use case, but that requires me to…

    6 条评论
  • Automating Linux container maintenance

    Automating Linux container maintenance

    I was a big fan of the LxdMosaic for several reasons. Mostly because of the graphical interface, but several other nice…

  • Event driven user updates in Saviynt

    Event driven user updates in Saviynt

    I promised you this one. So I will delve directly into it.

    3 条评论
  • Analytics driven Identity Governance Administration

    Analytics driven Identity Governance Administration

    As promised, hereby a practical example of how we have engaged the subject of implementing Identity Governance…

    1 条评论
  • Data driven Approach to IGA

    Data driven Approach to IGA

    Introduction: Navigating the Landscape of Identity Governance Administration (IGA) In the intricate tapestry of modern…

  • Perfect IGA architecture - continued

    Perfect IGA architecture - continued

    Continuing on my previous short story: In very low practical terms, I will here follow an import of Identity data from…

  • Forget DynDNS

    Forget DynDNS

    After starting to use desec - which has an API for managing you DNS settings - I have found that to be much more…

  • OpenZFS is the king

    OpenZFS is the king

    Many chapters has been written, still open and closed in regards to Oracle. Many Open Source projects has been taken…

    1 条评论
  • Identity Governance Administration. Done right.

    Identity Governance Administration. Done right.

    I am a keynote speaker on conferences and events in regards to Identity Management. What I presents is my take on…

    1 条评论