reference-architecture
Diagram
Description
IAM Governance
Acquisition
The IAM TCO
Authentication
Natively, the application only supports password-based authentication. To implement more robust authentication mechanisms and/or implement SSO, application virtualization may be an option.
Access Model
The application supports the direct granting of fine-grained entitlements to identities and/or their grouping into roles. A typical best practice is to avoid direct fine-grained access permissions and systematically grant access via roles.
Provisioning
The absence of native IAM integrations gives no choice but to provision and administer the application manually. A typical SoD requirement is to enforce segregation between application provisioners, administrators, and functional users.
PAM
Administration may be forced via a bastion. Password automatic rotation will require client-side scripting which comes with an additional development and maintenance cost. The possibility of bypassing the bastion must be analyzed, especially if the administration and functional clients share the same protocols. If bastion bypass cannot be technically avoided,