Identity Propagation (Dictionary Entry)
Contexts | IAM |
---|---|
Term | Identity Propagation |
Alternative Forms |
|
Definitions | The synchronization of an identity, or part of it, or of some representation of it, from one source directory to a target directory. This allows the target system to assure traceability and accountability independently from the source system. |
Related Terms |
Quotes
Account propagation: Synchronize or replicate accounts to the cloud provider, usually from directory services.
(Securosis, 2013, p. 12)
Identity Propagation: Some applications require that pieces of identity propagate to other systems. This replication objective is simple: applications may replicate the identity for better performance, cost, or simple failure defense system. More complex applications may require a unifed identity directory where an identity created by some application may be used in another application. Ideally, a propagation must occur after each change in some identity, and the propagation must occur in a reliable way to avoid the problems of safety and consistency [33].
(Cremonezi et al., 2020, p. 8)
Identity propagation provides a mechanism to allow a user identity from an external security realm to be preserved, regardless of where the identity information was created, strengthening accountability across distributed environments.
(...)
The term distributed identity represents user identity information, for example, an X.500 distinguished name and associated LDAP realm, that originates from a remote system. The distributed identity is created in one system and is passed to one or more other systems over a network.
(...)
Identity propagation allows the distributed identity to be preserved, regardless of where the identity information was created, for use during authorization and for auditing purposes. The distributed identity is part of the identity context that is carried with a request from the external client application to the server, and it is incorporated in the access control of the server as part of the authorization process (...)
Bibliography
See Also
-
Casella et al., 2021 (Bibliography)
-
IBM, 2020a (Bibliography)
-
Identity Propagation (Dictionary Entry) (Dictionary)
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.