As more and more customers are transforming their applications to cloud the main questions arises are:
- How do I secure my data and processes while it’s running on cloud?
- How do I make sure all my applications are secured with proper authentication and authorization approach implemented?
- Bulk User Handling via Process using Files
- On premise Identity Provider i.e. AD as core provider
- Cloud Hosted Integration Identity Provider i.e. cloud IAM in B2B and/or B2C modes
- Sync with core Identity stores i.e. AD and cloud IAM
- RBAC based User access for Cloud platform services
- Role Based User Access to applications
- Monitor & Self-Healing
Maybe you could elaborate on the architecture for clients that are moving everything into the cloud(s) and abandoning anything on-premises.
Thanks
Point Taken, Erik.
Thanks.