TM BUY E R ’ S GUI D E : R A D I A N T O N E Toward a Federated Identity Service Based on Virtualization A Buyer’s Guide to Identity Integration Solutions, from Meta and Virtual Directories to a Federated Identity Service Based on Virtualization www.radiantlogic.com | 877.727.6442 © Copyright 2017 Radiant Logic, Inc. All2017 rightsRadiantLogic, reserved. r20170725 www.radiantlogic.com | 877 727 6442 | © Copyright Inc. All rights reserved. 1 TM BUY E R ’ S GUI D E : R A D I A N T O N E Table of Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Today’s IAM: The New Urgency for a More Agile Identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 The Rise of Federation Standards: Solving the Issue of Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 An Excellent Solution to the Access Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 …That Doesn’t Solve the Underlying Identity Integration Issues . . . . . . . . . . . . . . . . . . . . . . . . . . 5 An Identity Hub to Support the IdP: Why You Need a Federated Identity Service . . . . . . . . . . . . . . . . . . . 5 Implementing the Enterprise Identity Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 The Need to Consolidate and Rationalize Identity and Profiles Across Silos . . . . . . . . . . . . . . . . . . . . . 6 Cracking the Code of Identity Integration: A Quick Review of Challenges and Solutions . . . . . . . . . . . . . . . . 6 A Flexible Integration Layer for an Incremental and Progressive Approach . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Beyond Meta and Virtual: A Federated Identity Service Based on Virtualization . . . . . . . . . . . . . . . . . . . . . 8 Federating Identity: A Proven Pattern for Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Protect Your Investments and Future-Proof Your Infrastructure with RadiantOne . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Key Components of a Federated Identity Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Use Cases for the RadiantOne Federated Identity Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 www.radiantlogic.com | 877.727.6442 © Copyright 2017 Radiant Logic, Inc. AllRadiantLogic, rights reserved. Inc. All rights reserved. www.radiantlogic.com | 877 727 6442 |© Copyright 2017 2 TM BUY E R ’ S GUI D E : R A D I A N T O N E Introduction The world of identity and access management is expanding in all dimensions, with more users, more applications, more devices, and more diversity—and these multi-faceted demands are stretching the current landscape of IAM for most organizations and enterprises. The adoption of federation standards, such as SAML 2.0, OpenID Connect, and OAuth 2.0, promises a new way to combat rising complexity. However, the successful adoption of these technologies also requires a rationalization and consolidation of the identity infrastructure, which, for most sizable enterprises, is highly fragmented across multiple identity silos. While federation standards can bring secure and orderly access to the doors of the enterprise, organizations will still need a way to unlock those doors into their complex and often messy identity infrastructures. To ensure security these days, the entire diverse and distributed enterprise identity infrastructure must become one secure global service. A federated identity service based on virtualization is the answer for protecting today’s increasingly federated environments—and evolving them to meet future demands and opportunities. In this paper, we’ll look at how such a service helps you manage all this complexity and see how other solutions stack up. Today’s IAM: The New Urgency for a More Agile Identity With new applications on the web and in the cloud to enable, your security is stretching far beyond the borders of your enterprise. At the same time, new user populations are accessing these applications, from employees to contractors, customers, partners, and more. And the types of devices used to access these apps are exploding as well, with users tapping in from anywhere in the world, using mobile devices both corporate and personal. The days when your largest concern was employees accessing internal resources from their desks using their company computers are over. Apps SaaS apps Apps in public clouds Partner apps Apps in private clouds On-premises enterprise apps Identity Employees Enterprise computers Enterprise-issued devices Public computers Personal devices IOT Contractors Customers Partners Members Users Devices All this points to one massive access and identity integration problem with multifaceted dimensions within an increasingly far-flung, heterogeneous environment. If you dive into the details of most web, portal, and cloud access deployments, you see a pattern of complex, hard-coded point-to-point connections that are expensive to deploy, inflexible to maintain, and difficult to evolve. www.radiantlogic.com | 877.727.6442 © Copyright 2017 Radiant Logic, Inc. AllRadiantLogic, rights reserved. Inc. All rights reserved. www.radiantlogic.com | 877 727 6442 |© Copyright 2017 3 TM BUY E R ’ S GUI D E : R A D I A N T O N E Today’s identity infrastructures face the traditional challenge of multiple links to multiple sources and targets. This creates an unmanageable “n-squared” problem, where there are too many custom links, each one extremely expensive to manage. Devices $ 0 0 0 5 2 16 1 8 8 9 0 Cost of each custom link Cloud and Web Apps Internal Enterprise Apps AD Forest/Domain A Directories Identity Sources AD Databases Forest/Domain B The Rise of Federation Standards: Solving the Issue of Access The good news is that as identity environments become more complex, we have also seen the adoption of federation standards, such as SAML 2.0, OpenID Connect, and OAuth 2.0, designed to better manage security and address complexity. In this architecture, the application can focus on delivering its core services, while delegating authentication and attribute management to a third party. Essentially, federation architecture divides application security into two roles: ▲▲ The service provider (SP), which provides the functionality of the application, on the web, internet, or cloud. The SP controls the access to the resource, but delegates authentication, groups, and attribute management to a trusted external identity source, namely… ▲▲ The identity provider (IdP), which manages its own identities and profiles, providing them with access to the universe of new applications. The end goal is to increase security, flexibility, and end user experience with seamless SSO. Let’s look at how that’s working in practice. An Excellent Solution to the Access Problem… Devices The promise of federation is to separate out the identity management tasks—the job of the IdP—from the application, the SP. First, let’s consider the SP at work. On the first request from a user to access a protected page or service, the service provider delegates the request for authentication and any additional attributes required by that application logic to an agreedupon identity provider. So far, so good. Now imagine that we have n different service providers, all routing access requests for authentication and attributes to a common identity provider. This action is how SSO is delivered via federation, and it’s a key value for a federation of applications. And the beauty of this mechanism is that it’s well-supported by industry standards and many excellent SPs or companies. Cloud Apps FE D A ER TE D C AC ES S Identity Provider Federation enables you to secure access to many different applications far beyond your firewall—but it doesn’t solve the identity conundrum for you. ? Federation cuts through the confusion of multiple applications making access requests to multiple identity sources—and it separates the ownership of the service from management of the identity. So it should be no surprise that amid the barrage of new apps, new populations, and new devices, the whole IT world is heading toward a large-scale adoption of federation. www.radiantlogic.com | 877.727.6442 © Copyright 2017 Radiant Logic, Inc. AllRadiantLogic, rights reserved. Inc. All rights reserved. www.radiantlogic.com | 877 727 6442 |© Copyright 2017 4 TM BUY E R ’ S GUI D E : R A D I A N T O N E …That Doesn’t Solve Underlying Identity Integration Issues However, as implementations are spreading, we’re seeing another part of the architecture becoming a serious impediment to success. While solving the issue of having to federate access, the federation architecture is putting new pressure on organizations and enterprises that now need to assume the role of identity provider. For most sizable current deployments, this means dealing with a large number of heterogeneous and distributed identity silos—AD & LDAP directories, databases, APIs—each with its own authentication method and specific identity representation. In order to present a global view of identity and attributes to the federation access layer, they must broker authentication and identity attributes from across their multiple internal identity systems. And that’s no mean feat, given all the complexity within the infrastructure. E D A C C E S S Devices Internal Enterprise Apps T A E D E R Identity Provider F Multiply this by all the applications you need to support, and you’ll begin to see the difficulty that companies face today. For every application, the IdP must find the user profile in your diverse infrastructure, authenticate them, and gather relevant attributes—then package this information in the specific format required by that application, because even though tokens might be expressed using the same standard, each application expects its own flavor of SAML or OAuth. ? AD Identity providers have a hard time delivering secure tokens, given the complexity of the underlying infrastructure. Forest/Domain A Identity Sources Directories AD Forest/Domain B Databases An Identity Hub to Support the IdP: Why You Need a Federated Identity Service Just as planes don’t fly from every location to every other location, you shouldn’t have to route every authentication and access request through all your backend stores. No distributed, heterogeneous system can integrate identities on the fly like that. After all, there’s a reason that federation standards focus the authentication requests to one or a limited number of IDPs—because hubs make routing easier and more efficient. In short, that means a layer of identity integration. Devices E S S Federating access through WAM/SAML/WS-Fed/OAuth/ OpenId Connect Layer A T E D A C C Identity Provider Y E D E R FID ID E N T IT F R A T E D Enterprise Apps D E Directories Databases E Federating identity through virtualization F Airlines have established hub cities to route flyers more efficiently, and your identity infrastructure needs the same smart structure to better fulfill its role as IdP. But establishing a hub means more than responding to SP requests and providing a secure token service, it requires that you have a global view of your identity that’s fully rationalized across all sources—an agile and responsive identity that can be accessed, remapped, and adapted quickly. AD Forest/Domain B AD Partner Directory Forest/Domain A In an ideal world, your identity mess would be managed virtually, through a federated identity hub, so you can provide exactly the view of identity each federated application requires—without costly custom coding. www.radiantlogic.com | 877.727.6442 © Copyright 2017 Radiant Logic, Inc. AllRadiantLogic, rights reserved. Inc. All rights reserved. www.radiantlogic.com | 877 727 6442 |© Copyright 2017 5 TM BUY E R ’ S GUI D E : R A D I A N T O N E Implementing the Enterprise Identity Provider Although it’s grown more complex, this problem of identity integration is not new. As soon as you have multiple applications, where you need to grant access to resources based on the identity or roles of a person, program, or agent—you need a way to provide a list of those identities, along with their credentials and attributes, to support authentication and authorization. Initially, most applications internalized identity information, managing this list on their own. But while different applications exist to serve different needs, the population of users is generally common—or shared across many common sub-groups—between applications. As applications multiplied, so grew the need to externalize these identities and attributes outside of the specific scope of a given application. It became clear that identity should be managed as a common shared service, and the idea of the common repository, a directory, along with the related services to keep such a system up-to-date, was born. The Need to Consolidate and Rationalize Identity and Profiles Across Silos The specialization that makes an application efficient and useful also tends to create an information silo. When a given application manages its own list of identities, it will generally enrich this identity profile with attributes that are characteristic of that application. So an HR application will enrich a generic employee profile with attributes that are specific to the HR realm, while a sales automation tool will enrich a customer profile with information collected during the sales process. Of course, some of those aspects will be useful only to each application, while others are critical to share across the organization. As applications multiply, relevant identity information spreads everywhere. But because some of that information is shared, the requirement of synchronizing these different identity images managed by given applications gave rise to multiple “synchronization” processes. So even if externalizing identity from an application into a directory is a step in the right direction, without support for additional services, this approach only adds to the problem, instead of solving it. As we saw in the n-squared diagram on page 4, in a system already saddled with multiple point-to point-links (many painstakingly hardcoded and difficult to evolve), we are only compounding the complexity with new nodes and new links. Point-to-point integration, where the identity information is consolidated into a single store, is fine in small doses, but doesn’t scale well as you add more sources. Cracking the Code of Identity Integration: A Quick Review of Challenges and Solutions In light of these issues, one potential solution is to create a central repository that acts as an identity hub. This idea evolved into the enterprise directory, which gave us a centralized view of identity, but also proved to be inflexible. It was theorized that such a collection of information about identity would act as an “omniscient” process—an “application of all applications.” In reality, however, the sort of generic information that could be collected and managed centrally amounted to a very bland profile and negated the value and contributions of specialized applications. After all, they may be silos, but they’re full of rich and relevant attributes. The metadirectory was designed to address this inflexibility, creating an abstract integration and synchronization layer to aggregate all the identity directories. Metadirectories were a big step forward, faster and much easier to update than the traditional enterprise directory. But they weren’t quite “meta” enough to solve the ongoing issue of identity integration. Metadirectories were complicated to deploy, support, and upgrade, because the amount of abstraction was not enough to automate processes, turning identity architects into programmers instead of power users. Without a clear data model, or the tools to reverse-engineer the data models behind existing sources, the system cannot abstract away the complexity of the synchronization process and still requires too much scripting or lightweight programming. In an effort to avoid the synchronization issues of the metadirectory, Radiant Logic invented the virtual directory. While this agile abstraction layer was easier to use and deploy, it also requires multiple hits on the underlying identity stores, making it only as fast as its slowest source. With the virtual directory, you trade the performance of the metadirectory for the flexibility and simplicity of virtualization. But while this simplicity enables the deployment of more use cases and adds value to your identity, these performance issues mean the virtual directory alone can never be a strategic piece of your identity infrastructure. www.radiantlogic.com | 877.727.6442 © Copyright 2017 Radiant Logic, Inc. AllRadiantLogic, rights reserved. Inc. All rights reserved. www.radiantlogic.com | 877 727 6442 |© Copyright 2017 6 TM BUY E R ’ S GUI D E : R A D I A N T O N E A Flexible Integration Layer for an Incremental and Progressive Approach No two identity deployments are the same. Different approaches are required for different integration efforts, depending on the objective, the scale, and the complexity of the initiative. More than a simple “point solution,” a federated identity service is a complete platform that addresses the entire spectrum of integration needs—one that grows along with you as your business evolves and changes. It is the only solution that can take you all the way from lightweight identity aggregation to complete integration, with one global identity set. 1. Identity Aggregation for Lightweight, Proxy-based Integration Multiple identity systems are regrouped within a common root, yet remain clearly separated. Each subsystem of identity is kept as-is, but a common “directory umbrella” regroups access, and a virtualization layer proxies security requests to the appropriate subsystem. The management of each subsystem remains unchanged. 2. Subsystem Integration Difficulties can arise when duplicate user accounts for the same identity exist across subsystems. One common example for subsystem integration is the need to authenticate users across different Active Directory domains and forests. In order to present a single, complete view of each user to consuming applications, the integration layer needs to be able to link those overlapping accounts as if they belong to a global logical directory. Once the identities are disambiguated, flexible identity views can be built around the newly-defined hierarchy, without affecting the underlying directory hierarchy. 3. Complete Integration for a Fully Integrated, Absorbed System To enable new services, you often need a complete list of identities from across many disparate sources—such as LDAP directories, Active Directories, SQL databases, and web services—presented in the format the service expects to see. This is typical of mergers and acquisitions, which insert new identity silos into an already fragmented identity infrastructure, while adding the requirement of granting secure access to new users. RadiantOne FID, our federated identity service based on virtualization, has the unique ability to extract and understand the metadata from underlying repositories allows it to combine and re-model data endlessly, adapting your existing resources to suit new view requirements. Read / Update Data HIGH Level 3: Complete Integration • Creating a logical unified directory (accessible via LDAP, SQL, or web services) containing a union-compatible list of users from across all data sources, with a global profile for each. I N T E G R AT I O N • The instantiated view of your transformed data is “persisted” in a real LDAP directory, to ensure scalability Read Data • Auto-refresh ensures data is synchronized and up-to-date in near real time • Complex correlation rules can be used to link duplicate accounts for which no common identifier exists in backends • New views can be modeled and created based on the metadata of underlying identity stores, to suit individual application requirements Level 2: Subsystem Integration • Merging identity silos containing overlapping user accounts D E G R E E O F • A common identifier which can be used to link duplicate accounts exists • Data format in underlying sources matches the requirements of the application, or simple remapping is sufficient Traditional VDS Level 1: Proxy Virtualization • Small-scale aggregation, for example: proxying access to different business unit silos • Little to no user overlap across the aggregated data sources • Data format in underlying sources matches the requirements of the application, or simple remapping is sufficient • Speed of backends is adequate, advanced caching is not required LOW TACTICAL R OI / S TR ATEG I C I M PA C T STRATEGIC www.radiantlogic.com | 877.727.6442 © Copyright 2017 Radiant Logic, Inc. AllRadiantLogic, rights reserved. Inc. All rights reserved. www.radiantlogic.com | 877 727 6442 |© Copyright 2017 7 TM BUY E R ’ S GUI D E : R A D I A N T O N E Beyond Meta and Virtual: A Federated Identity Service Based on Virtualization What you need is a way to combine the best of meta and virtual directories, for a 360-degree view of identity. Such a solution: ▲▲ Integrates and federates your identity sources into a common hub. ▲▲ Brokers authentication for your portal, federations, and applications. ▲▲ Delivers attributes and rich profiles for smarter security policies. ▲▲ Migrates and modernizes your aging directory infrastructure. So how does such a system work? First, we must federate identity in order to integrate it. Federating Identity: A Proven Pattern for Integration We have seen that the main challenge is to integrate identity and deliver it as a global/shared service that many applications can use for their authentication and authorization needs. We know that centralizing data into an authoritative store makes for an inflexible and difficultto-evolve identity infrastructure. And we know that while the partially-abstracted directory service supported by metadirectories offers good performance and synchronization, it’s still too complex to deploy, too inflexible to update, and too centralized in its synchronization of credentials. But by applying a pattern—federation—that has shown success across two different domains that are relevant to identity and data management, we are building on more solid ground. Internal Enterprise Apps 11 12 1 2 10 9 3 4 8 7 6 5 11 12 1 2 10 9 3 4 8 7 6 5 11 12 1 2 10 9 3 4 8 7 6 5 Lookup 3 Lookup 2 Logon/credential Lookup 1 AD Forest/Domain A Directories Identity Sources Federating identity does this: AD Forest/Domain B Databases E S S Devices C C Cloud Apps ID E N T F IT E Y D E R A T E Sounds familiar, right? In fact, this looks a lot like the way our federated identity service works: Federated Access via SAML, OAuth, etc. Cost in terms of support and execution—time is expensive for each custom link A And in the world of the data management and distributed databases, a federated database— which is often deployed as a hub and leverages “data virtualization”—pulls images and rationalizes them from across distributed sources, each of them staying authoritative for some specialized aspects of the data but contributing to the global system. $0005216188 90 Devices D In the domain of security, we’ve already seen that by funneling authentication requests for multiple service providers through standards such as SAML 2.0 and OpenID Connect, we can “federate access” around identity providers. Notice here that the redirection of the calls and the support of an identity provider are greatly simplified by the adoption of a common authentication method— standards-based tokens. R A T E D Enterprise Apps D E Directories F E Databases AD Forest/Domain B AD Partner Directory www.radiantlogic.com | 877.727.6442 © Copyright 2017 Radiant Logic, Inc. AllRadiantLogic, rights reserved. Inc. All rights reserved. www.radiantlogic.com | 877 727 6442 |© Copyright 2017 Forest/Domain A 8 TM BUY E R ’ S GUI D E : R A D I A N T O N E The pattern for identity integration is to use a federated architecture where identity is federated from across diverse data stores, each with its own way of describing identity. This is accomplished through advanced identity virtualization. As the world of identity has grown increasingly complex, we’ve been evolving the virtual directory to meet new requirements. The process of virtualization has taught us how to translate diverse protocols, creating a smart abstraction layer that acts as a lingua franca, a way to represent very different identity systems in a unified world. This common representation or “data model” allows us to automate the synchronization process, delivering the best of a “meta-virtual” directory— a federated system that is always in sync, automatically. Protect Your Investments and Future-Proof Your Infrastructure with RadiantOne Federated Identity Service Based on sophisticated virtualization, our federated identity service, RadiantOne FID, federates, transforms, and rationalizes identity from diverse sources across the enterprise. The end result is an identity hub acting as an authoritative source for all user identities, along with attribute-rich profiles for every user drawn from multiple application silos. This information is delivered through customized views, designed to meet the needs of applications, whether they’re in the enterprise, on the web, or in the cloud. These views are stored in HDAP, a highly available, highly scalable LDAP directory based on big data technology, and kept in sync with the local identity sources. RadiantOne complements existing identity infrastructure investments and provides a flexible solution for the rationalization and integration of identities across existing silos, as well as newly merged or acquired organizations. Instead of blindly synchronizing identities and attributes across all of the different systems in a never-ending process of point-to-point synchronizations, the federated identity service provides multiple views of the identity information stored across these systems, in exactly the format and protocol that each specific application can easily consume—without any customization or changes. While RadiantOne is useful at any point in the project lifecycle, it’s particularly helpful to implement this data integration and synchronization layer first, unifying the fragmented infrastructure and creating the unique user profiles that drive IAM projects. Having RadiantOne in your environment speeds future deployments and ensures success across many essential initiatives, including WAM/ portal, cloud, federation, ABAC, mergers and acquisitions, and directory migration and modernization. Devices A C C E S S Federating access through WAM/SAML/WS-Fed/OAuth/ OpenId Connect Layer E D RadiantOne R A T federated identity service Y IT ID E N T F E D E FID D Enterprise Apps R A T E Federating identity through virtualization D E Directories F E Databases AD Forest/Domain B AD Partner Directory Forest/Domain A www.radiantlogic.com | 877.727.6442 © Copyright 2017 Radiant Logic, Inc. AllRadiantLogic, rights reserved. Inc. All rights reserved. www.radiantlogic.com | 877 727 6442 |© Copyright 2017 9 TM BUY E R ’ S GUI D E : R A D I A N T O N E The advantages of a federated identity service include: ▲▲ Quick deployments: Configure, don’t hard-code—RadiantOne makes it easy to deploy even the most complex applications, delivering identity data from multiple sources, without costly customization or complex synchronization. ▲▲ Global view: Get a single, rationalized view of your identity without violating internal or external regulations governing identity data or needlessly centralizing that data. ▲▲ Seamless evolution: Expand your portal security to keep up with new demands, while leveraging existing investments and taking advantage of high-availability for authoritative data stores. ▲▲ Richer data: Give your applications the exact views of identity they need, without slowing your system or having to develop a master enterprise schema. ▲▲ Automatic updates: Changes made in authoritative sources are reflected in real-time in the identity hub, thanks to RadiantOne’s smart synchronization. ▲▲ Elastic scalability: Radically scale your access and throughput, using HDAP, the first highly scalable and secure directory that’s based on big data and search technology. ▲▲ Safer system: Identity firewalls provide only one opening to the outside world, preventing denial of service attacks on primary data stores and providing further security to sensitive data inside the enterprise. Key Components of a Federated Identity Service Virtual Directories Metadirectories FID based on virtualization Categories Features and Capabilities/Characteristics Metadata, Information Representation, Context, and Semantic Get complete schema remapping, common data model, and reverse engineering of objects and relationships. No No Yes Perform data mapping and translation for simple objects. Yes Yes Yes Discover and extract metadata from each source and map this information to a common naming. No No Yes Use simple aggregation to create a complete list of identities where there’s no user overlap. Yes Yes Yes Integrate identities to build a unique list, correlating identities where user overlap exists, even without an existing global identifier. No No Yes Build trees which expose semantic relationships between identities and their resources. No No Yes Enable keyword search and contextual, semantically expressed data across the identity infrastructure. No No Yes Data Quality, Integration, and Application-Specific Views of Identity Partial Yes Yes Dynamic groups: Create flexible group definitions and automatically-generated groups based on attributes. No No Yes Create a flexible namespace allowing each application to have its own hierarchy and view of the data. No No Yes Restructure existing LDAP trees as new application views. No No Yes Handle complex joins to create global profiles, for fine-grained authorization and smart IdP. Easily extend views to reach additional backends or modify views to meet new requirements. No No Yes Authentication Proxying and Routing Proxy/route authentication requests to the appropriate identity source. Yes No Yes Handle different security protocols and credentials checking mechanisms. Yes No Yes Synchronization: Information Propagation and Update Enjoy easy to deploy point-and-click synchronization, with minimal scripting/custom coding. No No Yes Storage, Performance, and High Availability Persistent cache equipped with real-time synchronization that guarantees data integrity of authoritative sources. No Yes Yes Full LDAP v3 directory storage, based on big data technology for highest performance, availability, and scalability. No No Yes www.radiantlogic.com | 877.727.6442 © Copyright 2017 Radiant Logic, Inc. AllRadiantLogic, rights reserved. Inc. All rights reserved. www.radiantlogic.com | 877 727 6442 |© Copyright 2017 10 TM BUY E R ’ S GUI D E : R A D I A N T O N E Use Cases for RadiantOne FID Drive Your Web Access Management/Portal, Cloud, Federation, M&A, ABAC, and Directory Migration and Modernization Projects with RadiantOne RadiantOne integrates identity from across heterogeneous sources, providing a rationalized view of all your identity, no matter where or how it’s stored. By federating identity into a common “identity hub,” you can rise above complexity and deliver the very specific views of identity required by any application, whether it’s hosted at your enterprise, on the web, in the cloud—or even accessed via mobile devices. Because these views are data-intensive beyond the narrow scope of the traditional virtual directory, you also need a new way to store this information. Our RadiantOne federated identity service features HDAP, the world’s first high-availability directory built on big data standards. Thanks to its cluster computing architectures, HDAP scales easily to hundreds of millions of users and highly complex queries. With RadiantOne, you can: Authenticate Users: ▲▲ Create a global list of all identities, where every user is represented once and credential checking is delegated back to each authoritative source. ▲▲ Broker authentication across diverse internal user stores—including LDAP, AD, SQL, and web services—for any WAM/portal, cloud, or mobile applications. Authorize Access: ▲▲ Build a complete global profile for each user that’s referenced locally, with attributes coming from across your heterogeneous infrastructure. ▲▲ Build attribute-driven dynamic groups to easily enable a world of new services—and drive attribute-based access control (ABAC) policies. ▲▲ Manage context for finer-grained authorization, delivering a coherent view of attributes through advanced virtualization and joins. Extend Your Security Infrastructure: ▲▲ Integrate new populations and applications, for a single view of user data. With RadiantOne, integrating data stores from mergers and acquisitions take minutes instead of months. ▲▲ Externalize identity out of the data silos, such as databases and directories. ▲▲ Expand your portal and WAM solution without the risk, hassle, and expense of complex synchronizations and hard-coded identity integration. ▲▲ Project identities safely beyond the firewall, without exposing them to unnecessary risks. Modernize Your Directory Infrastructure: ▲▲ Unify user directories across AD and LDAP, resolving disparate user representations, naming conventions, and security means, while delivering a single view of users out of diverse infrastructures and providing a complete profile of every user with all the attributes needed for authorization and policy enforcement. ▲▲ Evolve an aging LDAP infrastructure without impacting your existing applications, using RadiantOne as an easily deployed in-place replacement with plug-and-play capability. ▲▲ Better leverage Active Directory by consolidating forests and domains, extending AD schemas, delegating authentication to AD, and even enabling Windows Azure Active Directory to extend SSO to Microsoft 365 and other cloud apps using AD credentials. www.radiantlogic.com | 877.727.6442 © Copyright 2017 Radiant Logic, Inc. AllRadiantLogic, rights reserved. Inc. All rights reserved. www.radiantlogic.com | 877 727 6442 |© Copyright 2017 11