...
Excerpt |
---|
This reference architecture represents a rudimentary legacy application that suffers from no native integration with modern IAM capabilities. It may As such it would pose a significant challenge to manage and secure. Since most organizations with some historical IT background have similar applications in practice, it is of interest to discuss how such an application could be managed in an efficient manner and secured in an effective manner. The second interesting aspect of this reference architecture is its simplicity. Such a monolithic siloed application is nearly atomic and thus represent a fundamental architectural pattern. |
Identity and Access Governance
...