Enterprise identity and access management poses key challenges

October 2008 Integrated Solutions

Enterprise identity and access management (EIAM) has caught the attention of many corporations as a way to manage information and provide authentication for users wishing to access the company’s database and systems. Many security companies have taken on the development of EIAM, considering its potential value. A number, such as Deloitte, Touche LLP, Sun Microsystems and Accenture, have made a joint effort to leverage on each other’s experiences in corporate architectures and security systems to develop a robust EIAM system.

Their efforts are due to the recent demand for secured EIM systems for companies to protect their databases. However, Frost & Sullivan believes that there are several key challenges in EIAM that these developers need to address.

The first challenge is the reliability of the EIAM system. All profiles of an organisation’s employees will be stored in such a system and security and access policies will be set on each profile to ensure that every employee will be able to access the applications they need. However, if the profiles of the users are not well managed, they may become confused. This may then allow some users the opportunity to access confidential database information to which they should not be privy.

If there is any change in a user profile, the new information will have to be updated manually and correctly so that the user has the right control assess. Apart from internal users, vendors will also be given access priorities in developing the company infrastructure which may pose a security risk.

The second challenge is the usability of EIAM systems. If an employee needs to use more than one system over the course of his or her work, this person may end up having multiple logins and passwords to these multiple systems. This has to a large extent already been addressed in many of the newly developed EIAM offerings, where one login and password can be used across all systems and applications in a company across all branches. This helps to improve consistency.

The third challenge is integration. In a corporation, many applications and systems are required in a number of different departments for daily operations. The challenge that most security developers encountered when they tried to integrate disparate application systems and security infrastructure was that each had its own authentication technologies. Open source and standards-based approaches have however been combined to address this issue.

The fourth challenge is the exploitation on emerging technologies such as Identity 2.0 and Web 2.0 for EIAM systems. Identity 2.0 is a digital identity to provide access control that originated from the Web 2.0 theory. Identity 2.0 emphasises using one ID that is transparent and flexible for each user. However, there are potential risks in Identity 2.0 such as identity phishing. These risks need to be investigated further, as the Identity 2.0 framework has not been completed and development work is still in progress.

The fifth challenge is for EIAM systems developers to create standards that enable data exchange enterprises that meet both the security policies and user preferences in a company. A significant problem often arises due to differences in the viewpoints of the users of the system and the management of the company that sets the security policies. Moreover, different policies are set in each company. This makes it particularly tough to create standards that will be agreeable to two or more different companies when they need to use the same system.

To overcome this challenge, the open source community is collaborating to build open development platforms and standards that can see eye-to-eye. These standards can serve as the foundation for an EIAM system.

In short, an end-to-end EIAM system that enables interoperability, security, and privacy is required to ensure security for the entire identity management lifecycle in an enterprise. Based on the current technology trend, Frost & Sullivan expects to see more developments in the EIAM research area and that these challenges will be addressed in the near future.

For more information on Frost & Sullivan’s technical and market analysis, please contact Patrick Cairns on [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Cape Town estates gain access to advanced security technology at Securex
Securex South Africa News & Events Integrated Solutions
For the first time, estate and complex security decision-makers in the Western Cape will have direct access to the breadth of solutions and expertise these shows are synonymous with.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...
Community-centric security architecture
Regal Security Distributors SA Integrated Solutions Residential Estate (Industry)
Securing any large area, whether it is a commercial park or a residential estate, is as much about protecting and monitoring the internal environment as it is about protecting the perimeter.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.