Designing a strategy for access to cloud resources
As we determine how access to cloud resources will be handled, let’s think about the evolution of identity and access architectures. Identity and access prior to cloud technologies were typically handled from application to application. Developers of on-premises applications would have their user database accessed from within the application. Every application would have a database of users and passwords. Windows AD user databases could be tied into these applications and could also be integrated into some of these applications. However, full single sign-on capabilities were not widely available.
As cloud technologies became available and software-as-a-service (SaaS) applications became more widely used by companies, the need to manage and govern identity and access expanded beyond the on-premises architecture. This expansion decreased the amount of control that IT departments had to protect identities and access behind network...