The Intersection of Identity Management and Cloud Computing

This document is a comprehensive analysis of all the ways that Identity and Access Management (IAM) solutions can be run in and integrate with cloud computing systems.

Both cloud computing and IAM are relatively new, so the first part of this document defines key concepts and terminology. Next, assumptions that clarify the scope of this document in terms of network topology and functionality are presented and finally a comprehensive list of architectural scenarios are presented, along with an analysis of the costs, risks and benefits of each scenario.

Please Register


1 Introduction
2 Background: Cloud Computing and IAM
2.1 The term "cloud''
2.2 Overview of cloud computing
2.2.1 SaaS, PaaS, IaaS
2.2.2 Private, community, public and hybrid clouds
2.2.3 Cloud vendors
2.2.4 Examples of public cloud vendors
2.3 Overview of identity and access management
2.3.1 Identity administration vs. runtime access control
2.3.2 Identity administration services
2.3.3 Access control services
3 Benefits of Cloud Computing
3.1 Lower, predictable costs
3.2 Capital vs. operating cost
3.3 Expertly managed systems
3.4 On-demand availability
3.5 Faster provisioning
4 Drawbacks of Cloud Computing
4.1 Control and dependence on third parties
4.2 Privacy and security
4.3 Regulatory compliance
4.4 Flexibility and customization
4.5 Reliability and connectivity
4.6 CSP business viability
4.7 Service level agreements
5 Network Architecture of Cloud Computing
6 The Intersection of Cloud Computing and IAM
6.1 Identity as a service (IDaaS)
6.2 Scenario analysis: identity administration and cloud computing
7 Summary
A Scenario Analysis: Identity Administration and Cloud Computing
B Scenario Analysis: Privileged Password Management
B.1 Backup vault in the cloud
B.2 Securing administrative access to cloud infrastructure