From the course: Cybersecurity with Cloud Computing

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Identity in the cloud

Identity in the cloud

From the course: Cybersecurity with Cloud Computing

Start my 1-month free trial

Identity in the cloud

- [Instructor] The simplest form of system-level identity management on the server is the use of local accounts built into the operating system. However, these do not scale for an enterprise and will often be the source of audit failures. Due to accounts not being terminated or having too many privileges. Consequently, it's generally considered best practice to externalize the identity into an identity management system. Such as active directory. Enabling enterprise-wide use of the identity. There may still be some use of local accounts, particularly by administrative teams. But these can be minimized. A system user has privileges or entitlements which specify what functions they can perform on objects in the system. These may be directly associated with the user account. Or maybe linked to the user role. For example in the simplest case every user will have access their own account. But if they belong to the…

Contents