REPOSITORY_HEADER // ID: 247
ACCESS_LEVEL: EXPLORER

IAM

CURATED_BY: littlehelperINITIALIZED: ABOUT 2 HOURS_AGOLAST_UPDATE: ABOUT 1 HOUR_AGO
awesome back-end-development
0
0
This is a mirrored zone from the [kdeldycke/awesome-iam](https://github.com/kdeldycke/awesome-iam) repository. Part of the Awesome list collection.

Overview

3_ENTRIES

In a Stanford class providing an overview of cloud computing, the software architecture of the platform is described as in the right diagram →

Here we set out the big picture: definition and strategic importance of the domain, its place in the larger ecosystem, plus some critical features.

Security

4_ENTRIES

Security is one of the most central pillar of IAM foundations. Here are some broad concepts.

Account Management

8_ENTRIES

The foundation of IAM: the definition and life-cycle of users, groups, roles and permissions.

Cryptography

5_ENTRIES

The whole authentication stack is based on cryptography primitives. This can't be overlooked.

Identifiers

4_ENTRIES

Tokens, primary keys, UUIDs, … Whatever the end use, you'll have to generate these numbers with some randomness and uniqueness properties.

Zero-trust Network

6_ENTRIES

Zero trust network security operates under the principle “never trust, always verify”.

Authentication

3_ENTRIES

Protocols and technologies to verify that you are who you pretend to be.

Password-based auth

9_ENTRIES

The oldest scheme for auth.

Multi-factor auth

13_ENTRIES

Building upon password-only auth, users are requested in these schemes to present two or more pieces of evidence (or factors).

SMS-based

7_ENTRIES

TL;DR: don't. For details, see articles below.

Password-less auth

2_ENTRIES

WebAuthn

2_ENTRIES

Part of the FIDO2 project, and also known under the user-friendly name of passkeys.

Security key

4_ENTRIES

Public-Key Infrastructure (PKI)

5_ENTRIES

Certificate-based authentication.

JWT

9_ENTRIES

JSON Web Token is a bearer's token.

Policy models

9_ENTRIES

As a concept, access control policies can be designed to follow very different archetypes, from classic Access Control Lists to Role Based Access Control. In this section we explore lots of different patterns and architectures.

RBAC frameworks

4_ENTRIES

Role-Based Access Control is the classical model to map users to permissions by the way of roles.

ABAC frameworks

4_ENTRIES

Attribute-Based Access Control is an evolution of RBAC, in which roles are replaced by attributes, allowing the implementation of more complex policy-based access control.

ReBAC frameworks

6_ENTRIES

The Relationship-Based Access Control model is a more flexible and powerful version of RBAC and is the preferred one for cloud systems.

AWS policy tools

6_ENTRIES

Tools and resources exclusively targeting the AWS IAM policies ecosystem.

Macaroons

3_ENTRIES

A clever curiosity to distribute and delegate authorization.

Other tools

1_ENTRIES

OAuth2 & OpenID

18_ENTRIES

OAuth 2.0 is a delegated authorization framework. OpenID Connect (OIDC) is an authentication layer on top of it.

The old OpenID is dead; the new OpenID Connect is very much not-dead.

SAML

9_ENTRIES

Security Assertion Markup Language (SAML) 2.0 is a means to exchange authorization and authentication between services, like OAuth/OpenID protocols above.

Typical SAML identity provider is an institution or a big corporation's internal SSO, while the typical OIDC/OAuth provider is a tech company that runs a data silo.

Secret Management

7_ENTRIES

Architectures, software and hardware allowing the storage and usage of secrets to allow for authentication and authorization, while maintaining the chain of trust.

Hardware Security Module (HSM)

5_ENTRIES

HSMs are physical devices guaranteeing security of secret management at the hardware level.

Trust & Safety

3_ENTRIES

Once you've got a significant user base, it is called a community. You'll then be responsible to protect it: the customer, people, the company, the business, and facilitate all interactions and transactions happening therein.

A critical intermediation complex driven by a policy and constraint by local laws, the Trust & Safety department is likely embodied by a cross-functional team of 24/7 operators and systems of highly advanced moderation and administration tools. You can see it as an extension of customer support services, specialized in edge-cases like manual identity checks, moderation of harmful content, stopping harassment, handling of warrants and copyright claims, data sequestration and other credit card disputes.

User Identity

7_ENTRIES

Most businesses do not collect customer's identity to create user profiles to sell to third party, no. But you still have to: local laws require to keep track of contract relationships under the large Know You Customer (KYC) banner.

Fraud

4_ENTRIES

As an online service provider, you're exposed to fraud, crime and abuses. You'll be surprised by how much people gets clever when it comes to money. Expect any bug or discrepancies in your workflow to be exploited for financial gain.

Moderation

4_ENTRIES

Any online communities, not only those related to gaming and social networks, requires their operator to invest a lot of resource and energy to moderate it.

Threat Intelligence

10_ENTRIES

How to detect, unmask and classify offensive online activities. Most of the time these are monitored by security, networking and/or infrastructure engineering teams. Still, these are good resources for T&S and IAM people, who might be called upon for additional expertise for analysis and handling of threats.

Captcha

5_ENTRIES

Another line of defense against spammers.

Blocklists

2_ENTRIES

The first mechanical line of defense against abuses consist in plain and simple deny-listing. This is the low-hanging fruit of fraud fighting, but you'll be surprised how they're still effective.

Hostnames and Subdomains

8_ENTRIES

Useful to identified clients, catch and block swarms of bots, and limit effects of dDOS.

Emails

4_ENTRIES

Reserved IDs

2_ENTRIES

Profanity

2_ENTRIES

Privacy

4_ENTRIES

As the guardian of user's data, the IAM stack is deeply bounded by the respect of privacy.

Anonymization

4_ENTRIES

As a central repository of user data, the IAM stack stakeholders have to prevent any leakage of business and customer data. To allow for internal analytics, anonymization is required.

GDPR

5_ENTRIES

The well-known European privacy framework

UX/UI

10_ENTRIES

As stakeholder of the IAM stack, you're going to implement in the backend the majority of the primitives required to build-up the sign-up tunnel and user onboarding. This is the first impression customers will get from your product, and can't be overlooked: you'll have to carefully design it with front-end experts. Here is a couple of guides to help you polish that experience.

Competitive Analysis

7_ENTRIES

Keep track on the activity of open-source projects and companies operating in the domain.

History

1_ENTRIES

Exploration_Discussion

0 / 3000