İçeriğe geç
KAMPANYA

Logo Tasarım + Web Tasarım + 1 Yıl Domain + E-posta + Hosting — $299 +KDV

AIOR

Identity and access management: SSO, MFA, RBAC, and the fundamentals that still matter

Sektör topluluğu — sorularınız, deneyimleriniz ve duyurularınız için.

Identity and access management: SSO, MFA, RBAC, and the fundamentals that still matter

Aior

Administrator
Staff member
Joined
Apr 2, 2023
Messages
175
Reaction score
2
Points
18
Age
40
Location
Turkey
Website
aior.com
1/3
Thread owner

Identity is the new perimeter​

The "perimeter" defence model is functionally retired. Identity is the perimeter.

Single sign-on (SSO)​

  • One identity provider — Okta, Microsoft Entra ID, Google Workspace
  • Apps integrate via SAML 2.0 or OIDC
  • User provisioning / deprovisioning automated via SCIM where possible
  • Conditional access policies — require MFA, device compliance, location-based rules

The single biggest IAM win for most organisations: getting all internal apps behind SSO.

Multi-factor authentication (MFA)​

  • TOTP (authenticator apps) — fine baseline
  • SMS — use only if no other option. Vulnerable to SIM swapping
  • Hardware keys (FIDO2 / WebAuthn / Passkeys) — phishing-resistant. The right answer for high-value accounts
  • Push notifications — convenient, but vulnerable to MFA fatigue. Use number-matching variants

In 2026, the move is to passkeys / WebAuthn.

Role-based access control (RBAC)​

  • Roles, not individual permissions, assigned to users
  • Roles based on job function, not on individuals
  • Periodic access review
  • Separation of duties — sensitive operations require multiple people

Privileged access management (PAM)​

  • Just-in-time access — privilege granted for a defined window, then revoked
  • Approval workflow for elevation
  • Session recording for sensitive operations
  • Vault-managed credentials with short rotation
  • No shared accounts; per-user even for privileged

Service-to-service auth​

  • mTLS — mutual TLS, certificate-based
  • OAuth client credentials — short-lived tokens
  • SPIFFE / SPIRE — workload identity for cloud-native
  • Cloud-native identity — IAM roles for EC2, service accounts for k8s pods

Long-lived static credentials between services are the risk. Replace them with short-lived, identity-bound credentials.

Lifecycle management​

  • Joiners / movers / leavers process formalised
  • Provisioning automated (SCIM, IaC for cloud IAM)
  • Deprovisioning within hours of departure
  • Quarterly access reviews — manager reviews their team's access
  • Annual deep review — full audit

Audit logging​

  • All authentication events
  • All authorisation decisions
  • All privilege changes
  • All identity-system admin actions
  • Centralised, with retention appropriate to compliance / forensic needs

One pattern we'd warn about​

"We have MFA enabled" without verifying enforcement. MFA configured but bypass-able is barely better than no MFA.

One pattern that always pays off​

Quarterly access review meeting — managers walk through their team's access, confirm or remove. 30 minutes per team.

What's your IAM stack?
 

Forum statistics

Threads
171
Messages
178
Members
27
Latest member
AIORAli

Members online

No members online now.

Featured content

AIOR
AIOR TEKNOLOJİ

Tüm ihtiyaçlarınız için Teklif alın

Hosting · Domain · Sunucu · Tasarım · Yazılım · Mühendislik · Sektörel Çözümler

Teklif al

7/24 Destek · Anında yanıt

Back
Top