User Identity and Access Management – What’s the Deal with IDP?
What user identity is? Why managing access is essential for businesses? How an IDP (Identity Provider) works? You will find the answer to these questions in the article.
Technologies (including IT technologies) used by production and service companies come from three main sources:
The main sources of technology from the company’s point of view are presented in Fig. 1.
Obtaining technologies from internal sources of the enterprise is possible when it conducts research and development (R&D) works, aimed at solving problems in its products, production processes, provision of services, service, etc.
The most important advantages of creating technology with the company’s own resources include:
Creating technology with the company’s own resources also has disadvantages. These include, among others:
Despite the numerous disadvantages and threats, without its own functioning infrastructure creating new technologies, it is difficult for a company to shape its own individuality and originality in order to help it build a strong global market position. In market practice, only the strongest players are able to build new IT technologies.
External sources of technology, adopted in the company’s policy as the basic way of supplying new technical and technological solutions and innovations, mean that it must be focused on constant monitoring of the environment in order to identify the sources of technologies and solutions useful in the enterprise and master the art of obtaining and adapting them for their own purposes. Technology transfer plays a huge role in this activity.
The advantages of external sources of technology are:
The disadvantages of external sources of technology include:
The advantages and disadvantages of combined technology sources, as the name suggests, are a combination of advantages and disadvantages of internal and external sources and must be considered individually.
Among combined sources, the most common practice in the IT sphere is the use of technologies made available on the basis of open source licenses and their adaptation to own IT projects. Often, such solutions are relatively the cheapest and ensure the fastest time to prepare the final solution.
At INNOKREA, for several years we have been developing our own product (in the broader sense IT technology), i.e. an auction system for a closed group of users. For its construction, we use combined technologies consisting of stable frameworks developed by global companies and communities (e.g. React, React Native) and ready-made components based on open source licenses and modules developed by our own programmers (e.g. using Python). In a similar way, we implement dedicated IT projects tailored to the individual needs of customers (using various IT technologies).
To summarize, a comparison of selected features of the main categories of the company’s technology sources is presented in Table 1.
User Identity and Access Management – What’s the Deal with IDP?
What user identity is? Why managing access is essential for businesses? How an IDP (Identity Provider) works? You will find the answer to these questions in the article.
Security
Hey, hey... Programmer, this is another article for you! The second part of the article on design patterns. Get to know Adapter and Memento.
Programming
Programmer, this article is for you! Grab a handful of useful information about design patterns.
Programming