Introduction to Identity & Access Management
Identity and Access Management (IAM) is the discipline of ensuring that the right individuals have access to the right resources at the right times for the right reasons. IAM is the cornerstone of modern security — without proper identity management, all other security controls are ineffective.
In today's hybrid work environment, with applications distributed across cloud and on-premises, IAM has become more complex and more critical than ever. Organizations manage thousands of digital identities — employees, contractors, partners, customers — each requiring appropriate access to systems and data. Effective IAM balances security with productivity, enabling seamless access while preventing unauthorized entry.
1. The Core Components of IAM
2. Authentication: Verifying Identity
Authentication is the process of verifying that someone is who they claim to be. Modern authentication uses multiple factors.
The Three Authentication Factors
- Something You Know: Password, PIN, security questions — most common, but easily compromised
- Something You Have: Smartphone, hardware token, smart card — adds physical possession requirement
- Something You Are: Fingerprint, face recognition, iris scan — biometric authentication
# Example: OAuth 2.0 Authorization Code Flow
POST /oauth2/token HTTP/1.1
Host: auth.example.com
Content-Type: application/x-www-form-urlencoded
grant_type=authorization_code&
code=abc123&
redirect_uri=https://app.example.com/callback&
client_id=myclient&
client_secret=secret123
# Response
{
"access_token": "eyJhbGciOiJSUzI1NiIs...",
"token_type": "Bearer",
"expires_in": 3600,
"refresh_token": "tGzv3JOkF0XG5Qx2TlKWIA"
}
Modern Authentication Protocols
- OAuth 2.0: Authorization framework for delegated access
- OpenID Connect (OIDC): Identity layer on top of OAuth 2.0
- SAML 2.0: XML-based authentication for enterprise SSO
- WebAuthn/FIDO2: Passwordless authentication with hardware keys
- Kerberos: Network authentication protocol (Active Directory)
3. Authorization: Granting Permissions
Authorization determines what authenticated users can do. It answers: "What access does this identity have?"
Authorization Models
| Model | Description | Use Case |
|---|---|---|
| RBAC (Role-Based Access Control) |
Permissions assigned to roles; users inherit role permissions | Enterprise applications, cloud IAM |
| ABAC (Attribute-Based Access Control) |
Access based on user, resource, environment attributes | Fine-grained, dynamic authorization |
| PBAC (Policy-Based Access Control) |
Declarative policies (e.g., XACML, Rego) | Complex, multi-cloud environments |
| ReBAC (Relationship-Based Access Control) |
Access based on relationships between entities | Google Zanzibar, social networks |
# AWS IAM Policy Example (RBAC)
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::company-bucket/${aws:username}/*"
}
]
}
# Open Policy Agent (OPA) - Rego Policy (ABAC)
package example
allow {
input.user.role == "admin"
input.method == "DELETE"
}
allow {
input.user.department == input.resource.department
input.method in ["GET", "POST"]
}
4. Single Sign-On (SSO)
SSO allows users to authenticate once and access multiple applications without re-entering credentials. Benefits include improved user experience, reduced password fatigue, and centralized security management.
- Okta: Leading cloud identity platform
- Microsoft Entra ID (Azure AD): Microsoft's identity platform
- Auth0: Developer-focused identity platform
- Ping Identity: Enterprise identity management
- Google Identity: G Suite identity services
5. Privileged Access Management (PAM)
PAM focuses on securing accounts with elevated privileges — administrators, system accounts, and service accounts. These accounts are the primary targets of attackers.
PAM Best Practices
- Just-in-Time (JIT) Access: Elevate privileges only when needed, for limited duration
- Just-Enough Access (JEA): Grant minimum privileges required for task
- Session Recording: Record privileged sessions for audit
- Password Vaulting: Store and rotate privileged passwords automatically
- Separation of Duties: No single user has unrestricted access
# Azure PIM (Privileged Identity Management) - Activate role az role assignment create --assignee "user@example.com" \ --role "Contributor" \ --scope "/subscriptions/xxx" \ --justification "Emergency maintenance" \ --duration "PT2H" # AWS IAM - Session Policy for temporary elevation aws sts assume-role \ --role-arn "arn:aws:iam::123456789012:role/AdminRole" \ --role-session-name "temp-admin" \ --duration-seconds 3600
6. Identity Governance and Administration (IGA)
IGA ensures that access rights are appropriate, reviewed regularly, and compliant with regulations.
- Access Certification: Periodic reviews of user access rights by managers
- Segregation of Duties (SoD): Preventing conflicting permissions (e.g., can't approve and execute payments)
- Automated Provisioning: Create/disable accounts automatically based on HR events
- Entitlement Management: Manage access packages for external users
7. Zero Trust Identity
Zero Trust assumes no implicit trust — every access request must be verified continuously.
- Verify explicitly: Always authenticate and authorize based on all available data
- Use least privilege: Limit access with just-in-time and just-enough access
- Assume breach: Monitor continuously for anomalies
8. Identity Federation
Federation enables identity sharing across organizational boundaries, allowing users from one organization to access resources in another.
- B2B Federation: Partner organizations access your applications
- Social Login: Sign in with Google, Facebook, LinkedIn
- Cross-Domain Identity Management (SCIM): Automated user provisioning
# SAML Federation Metadata Example
<EntityDescriptor entityID="https://idp.example.com">
<IDPSSODescriptor>
<KeyDescriptor use="signing">
<ds:KeyInfo>
<ds:X509Data>
<ds:X509Certificate>MIID...</ds:X509Certificate>
</ds:X509Data>
</ds:KeyInfo>
</KeyDescriptor>
<SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
Location="https://idp.example.com/sso"/>
</IDPSSODescriptor>
</EntityDescriptor>
9. Directory Services
Directory services store identity information and enable authentication and authorization.
- Microsoft Active Directory (AD): On-premises identity management
- Azure AD (Entra ID): Cloud identity platform
- LDAP: Lightweight Directory Access Protocol
- OpenLDAP: Open-source directory service
# Search for users in Marketing department ldapsearch -x -H ldap://ldap.example.com -b "dc=example,dc=com" \ "(&(objectClass=person)(department=Marketing))"
10. Identity Security Threats
- Credential Stuffing: Using stolen credentials from previous breaches
- Password Spraying: Trying common passwords across many accounts
- Phishing: Stealing credentials via fake login pages
- Pass-the-Hash: Using NTLM hash to authenticate without password
- Golden Ticket: Forging Kerberos tickets in Active Directory
- MFA Fatigue: Bombarding users with MFA prompts until they approve
Defense Against Identity Attacks
- Phishing-resistant MFA (FIDO2 security keys)
- Conditional Access policies (location, device, risk signals)
- Continuous authentication (behavioral biometrics)
- Identity Threat Detection and Response (ITDR)
- Regular access reviews and privilege reduction
11. Identity Security Certifications
- CIAM (Certified Identity and Access Manager): IAM certification
- SC-300 (Microsoft Identity and Access Administrator): Azure IAM certification
- Okta Certified Professional: Okta platform certification
- CISSP-ISSAP: Identity management concentration
12. Future of Identity Management
- Passwordless Authentication: FIDO2 passkeys, biometrics replacing passwords
- Decentralized Identity (DID): Self-sovereign identity using blockchain
- Continuous Authentication: Behavioral biometrics monitoring throughout session
- AI-Powered Identity Analytics: Machine learning for anomaly detection
- Identity Fabric: Unified identity across cloud and on-premises
Conclusion
Identity and Access Management is the foundation of security. Without proper identity controls, all other security investments are compromised. Effective IAM combines strong authentication (especially MFA), least privilege authorization, continuous monitoring, and regular governance.
As organizations adopt zero trust architectures, IAM becomes even more critical. The principle of "never trust, always verify" demands continuous identity validation, adaptive policies, and real-time threat detection. Mastering IAM is essential for any security professional.