Learning Library

← Back to Library

Identity Fabric: Breaking the Single‑Provider Myth

Key Points

  • The “identity fabric” concept debunks the two‑decade‑old fantasy that a single identity provider and user directory can handle all IAM needs, arguing that this approach no longer works in today’s hybrid environments.
  • In practice, organizations must manage two distinct IAM domains: consumer/CIAM (customers, partners, external users) and workforce IAM (employees, internal partners), each often requiring its own specialized system.
  • Most enterprises already operate multiple IAM solutions and directories, making the idea of a one‑size‑fits‑all platform unrealistic and a key reason why many feel they’ve made little progress with identity security.
  • The identity fabric framework aims to integrate and orchestrate these disparate IAM tools and data sources, providing a cohesive layer that reflects the complex, multi‑system reality of modern identity management.

Full Transcript

# Identity Fabric: Breaking the Single‑Provider Myth **Source:** [https://www.youtube.com/watch?v=uN5rr4n1fl0](https://www.youtube.com/watch?v=uN5rr4n1fl0) **Duration:** 00:16:13 ## Summary - The “identity fabric” concept debunks the two‑decade‑old fantasy that a single identity provider and user directory can handle all IAM needs, arguing that this approach no longer works in today’s hybrid environments. - In practice, organizations must manage two distinct IAM domains: consumer/CIAM (customers, partners, external users) and workforce IAM (employees, internal partners), each often requiring its own specialized system. - Most enterprises already operate multiple IAM solutions and directories, making the idea of a one‑size‑fits‑all platform unrealistic and a key reason why many feel they’ve made little progress with identity security. - The identity fabric framework aims to integrate and orchestrate these disparate IAM tools and data sources, providing a cohesive layer that reflects the complex, multi‑system reality of modern identity management. ## Sections - [00:00:00](https://www.youtube.com/watch?v=uN5rr4n1fl0&t=0s) **Debunking the Single‑IdP Myth** - In this opening, Bob Kalka explains that the “identity fabric” concept overturns the outdated 20‑year belief that a single identity provider and directory can solve modern IAM challenges, emphasizing the need for a hybrid, multi‑system approach. - [00:03:06](https://www.youtube.com/watch?v=uN5rr4n1fl0&t=186s) **Multi-Directory IAM Challenges** - The speaker explains that most organizations juggle separate consumer and workforce identity systems, resulting in fragmented Active Directory instances across on‑prem, AWS, and Azure that must be continuously synchronized. - [00:06:24](https://www.youtube.com/watch?v=uN5rr4n1fl0&t=384s) **Emerging Passwordless and Risk-Based IAM** - The speaker outlines the surge in client interest for passwordless access via passkeys and the complexities of deploying them across platforms, while also introducing risk‑based authentication as a real‑time, behavior‑driven evolution of multi‑factor security. - [00:09:49](https://www.youtube.com/watch?v=uN5rr4n1fl0&t=589s) **Critical Elements of Identity Fabric** - The speaker outlines seven essential components of an identity fabric, emphasizing the need for an identity orchestration engine and ITDR to automate identity lifecycle management and detect threats across disparate systems. - [00:13:13](https://www.youtube.com/watch?v=uN5rr4n1fl0&t=793s) **Key Elements of Identity Fabric** - The speaker explains the final three critical components—directory synchronization, identity governance, and privileged access management—required to maintain a unified, consistent system of record and control over user access in complex, hybrid environments. ## Full Transcript
0:00Hello, everybody. 0:01This is Bob Kalka, global lead with IBM Security. 0:04And our topic today is "what  is the identity fabric?". 0:12The identity fabric is a white, hot  term in cybersecurity these days, 0:17and a lot of people are asking questions, 0:19what exactly is this concept? 0:22What the identity fabric is,  is cutting through a fantasy 0:27that we've had in the cybersecurity  community for the last 20 years, which is 0:32there is a belief that for identity  and access management, that is: 0:37how do we manage users and their identities, 0:40and their accounts across all the different  systems and applications they need access to, 0:45is that if you go into the typical shop today, 0:48perspective in the philosophy is, 0:51I know how to solve this really tough problem. 0:54I'm going to choose one identity  provider and one user directory, 0:57and I'm going to focus all my investment on that. 1:01And for the last 20 years organizations  have been focused on that strategy. 1:05And yet when you talk to these clients, you find 1:09that they feel like they haven't made  much progress in the last 20 years. 1:13And the reason for that 1:15is that the approach of addressing  identity and access management 1:19through one identity provider  and one user directory 1:24is a complete fantasy because of the  hybrid reality of what we face today. 1:29So let me show you what I mean by that. 1:31When we talk about managing users and  their identities and their account, 1:36there's generally two different groups  of people that we're talking about. 1:40First of all, we're talking about  all of the consumers, the users, 1:45the folks out there that  interact with us as a business. 1:49And so we often will turn that consumer IAM 1:54or CIAM - and a lot of people will call that. 1:57And so once again, that's our customers,  it's our partners, it's people interacting. 2:01Then you have a second group of people 2:03that also need to have their user  accounts and identities managed. 2:07And that's all the people that we  have inside of our organization. 2:11It's our employees, it's our  partners and things like that. 2:14And that's generally termed workforce IAM. 2:18Now once again, the fantasy that  everybody's had for the last 20 years 2:23is that the way to manage this is pick  one identity and access management tool 2:27and one user directory to  manage all of this stuff. 2:31But let's look at what the reality is today. 2:34The reality is, is that most organizations 2:37will have a dedicated identity  and access management system 2:43for their consumers, for their  customers and things like that. 2:47And then once again, they will ideally go, 2:50well, the way to do that is I'm  going to have one directory, 2:55and that becomes the way that I  approach identity and access management. 2:59Now, using the fantasy as our key, 3:02you'd say, well, for my workforce, I'm  going to use the same system, right? 3:06Well, there are very few organizations, 3:08and I mean on 1 or 2 handfuls maybe 3:11that actually are able to do that. 3:13What almost everybody struggles with is the fact 3:15that there is at least one additional  identity and access management system, 3:20and at least one directory 3:23that's used for our employees that's  separate than the one we use for consumers. 3:27And anyone who does this for  a living is smiling right now, 3:30because they know that this  picture is very simplified, 3:34that usually what happens is there's a  lot of these user directories out there 3:39that have to be synchronized and pulled together. 3:42I'll give you an example. 3:43I had a client just recently tell me 3:45that they thought they had  standardized on one directory 3:48with Microsoft Active Directory very, very common. 3:51But he said my problem is, 3:53is I'm managing Active Directory on-prem. 3:56I've got a second team managing  Active Directory in AWS 4:01and a third team managing  Active Directory in Azure, 4:04and never the twain shall meet. 4:07And so the reality is that most  organizations have a tool for consumer IAM, 4:12a tool for workforce IAM, 4:14but behind the scenes there's a  whole lot of different sources 4:17of user information that's being used for this. 4:20Now you'd say, well, this alone looks like  something we could least get control over. 4:25But then when to realize how bad the picture is, 4:28we've forgotten an entire plane of  places where there's lots of these. 4:33And that is, if you look at all of our legacy apps 4:39and our various cloud providers, 4:41typically you'll have built-in  identity and access management 4:46and some kind of user directory 4:48inside of each one of our applications, 4:52inside of each cloud service that we're using. 4:56And so you get to this point that the reality is 4:59that most organizations today 5:03are managing user accounts across  many, many, many different places. 5:08But you see why the fantasy is a problem. 5:11If you believe that that one, for example, 5:13is where I'm going to put all my investment, 5:16then what the organization will do is  it will not recognize the rest of this. 5:21It treats it as a sunk cost  and says it's just something 5:24that we have to deal with and manage individually. 5:28But just think of trying to get a  consistent user identity experience 5:33when you're managing them in  all these different places. 5:36And that's what almost every  organization is doing today. 5:39Given the fact that user identities are generally  the number one attack point for cyber attacks, 5:46you realize very quickly why it's so  important that we get a hold for all of this. 5:51So this is what the identity fabric is. 5:55The identity fabric is how do I take a user, 5:58their identities across all of  these different systems potentially, 6:03and manage them in a consistent way. 6:06Now to add fuel to the fire  here, why this is so important, 6:10is that there are a lot of very, 6:13very impressive newer technologies  and identity and access management 6:17that we want to apply consistently across a user,  across all of these systems that we're looking at. 6:24So for example, there's  four different technologies 6:28that a lot of people are trying to apply  around identity access management today. 6:34For example, in the last year I have  not had a single client meeting, 6:39and I meet with clients every day 6:40where the term "passwordless" has has not come up. 6:47It comes up in every briefing. 6:49What is passwordless? 6:50Passwordless means, how do I streamline access 6:53for someone trying to get access  to a system or an application, 6:56or whatever it happens to be  - a cloud service, whatever? 6:59How do I streamline it by using  Passkeys like Fido Passkeys, 7:05to be able to get in without entering a password? 7:08It's more secure and yet easier to use. 7:10It's something everybody wants to be able to do, 7:13but if you have to apply these passkeys  across all these different systems, 7:17it's impossible to manage. 7:19So passwordless support is one of the pieces. 7:22Secondly, a white-hot term you're hearing  a lot about: risk-based authentication. 7:28What is that? 7:29That is multi-factor authentication on steroids. 7:33That is applying different  levels of access for people 7:37based on a real time, ongoing  historical assessment of that 7:43person's risks based on how they're acting. 7:46So it's not only, is this someone  who's logged into us 275 times, 7:52this is the 276th time, 7:55and they're in the same place with the  same device configured in the same way 7:58that you might say, well, that's fine, that's  probably give me a password or something. 8:04But if you notice that you  analyze their typing rate, 8:07and their typing rate is a lot  different than it's ever been, 8:10and their error rate in typing is a  lot different that it's ever been? 8:13You might say, you know what, I probably  need another form of authentication here. 8:16So that's an example of risk based authentication. 8:19Being able to apply a real time,  ongoing historical risk assessment 8:26of everyone who's trying to access your systems. 8:28You realize if you're managing identities, all  these places, you're never going to get that. 8:33So how do we apply risk based  authentication consistently across this? 8:37Identity fabric helps with that. 8:39A third element: how about  there's a lot of advanced 8:43techniques out there such as identity proofing. 8:48So when someone is registering  to access your systems 8:52and your applications and  your various whatever, right? 8:55Is that, can I do identity proofing callouts? 8:57Doing that across all these systems? 8:59Literally impossible. 9:01And then finally, a fourth factor that we run into  that a lot that people don't think of at first, 9:06is how do you effectively do threat  management against identities? 9:12That's one of the weak spots. 9:15Everybody's got a security  operation center and a SIEM tool, 9:18Security Information Event Management tool, 9:20that takes input from all over the  place and looks for threats. Right? 9:24Core key part of any security operations center. 9:27But all of the tools for  doing that are IBM QRadar, 9:31Splunk, the various tools that are out there 9:34are not good at being able to  determine identity focused threats and 9:38because that's the primary, the first, the  most common mechanism for cyber attacks, 9:43it's kind of important that  we're able to detect identity 9:46threat vectors as they're happening in real time. 9:49And there are ways of doing that, 9:52but hasn't been able to be applied because people 9:54are trying to apply it across all  these different identity stacks. 9:58All of this is exactly what  the identity fabric is for. 10:02The identity fabric is what are  the things that need to exist 10:07for us to be able to take this mess, and actually  finally, after decades, get control over it. 10:13And we have enough use cases now of  clients doing this, we know it works. 10:19So let's cover the seven things that are 10:22absolutely critical for any  identity fabric approach. 10:28Alright so let's look at this. 10:29So number one: number one, and this is huge, 10:34is you have to have some kind of  identity orchestration engine. 10:40Orchestration means you can automate workflows, 10:43you can do call outs like  identity proofing engines, 10:46and you can orchestrate an identity  - creation, management, removal, etc. 10:52their access across all the  different systems that you have. 10:57In other words, we're not pretending that 10:59these other identity management  subsystems don't exist anymore. 11:02We're actually automating the orchestration  of managing use across all of them. 11:07That's number one. 11:09Number two: in cybersecurity, every year  we get a couple of acronyms that crop up. 11:13And one of the hot ones this year is ITDR, that  stands for Identity Threat Detection and Response. 11:22And that's this piece. 11:23That is the ability to detect threat  vectors within the identity management stack 11:29and actually feed it then to your SIEM, you know, 11:32whether it's Qradar, Splunk or something else 11:35and allow you to get threat  telemetry around identity usage 11:39that is far beyond what any SIEM  tool could ever do by itself. 11:44Okay. 11:45Now, third: the third critical element of doing 11:49the identity fabric is the ability  to onboard legacy applications. 11:57One of the most common problems we see is  clients have lots of legacy applications 12:02with their own homegrown  identity access management stack 12:05that are unable to use modern  authentication mechanisms, 12:09such as risk based authentication or  passwordless with support with Passkeys, right? 12:13So being able to do low-code no-code, 12:16quick onboarding of legacy apps to  use modern authentication techniques 12:20is huge, because not only  does it improve the security, 12:23it allows the auditability  the systems to be far greater. 12:26The fourth element that we run into  when we look at the identity fabric 12:31is in fact this risk-based authentication idea. 12:36This is how do you have this ongoing  real time yet historical risk analysis, 12:43risk assessment of every person trying  to access your systems from anywhere? 12:48At IBM or with our IBM verify portfolio, 12:52we have done some incredible things 12:55using literally insights from the banking sector 12:59to apply technologies that allow you  to do things like analyze typing rate 13:03or how you move your finger on your mobile device 13:06and stuff like that, to determine what is 13:09a risk assessment of you in the  state that you're currently in. 13:13All right, so number five: 13:15the fifth critical element  to being able to do this is 13:19directory Synchronization and consolidation. 13:30You know, the directory issue was  something that was huge about 25 years ago 13:35and everybody thought, oh, I  think we've solved that one. 13:37What we found, like the example I gave you of  Active Directory and three different platforms, 13:42is the problem's even worse now in  the hybrid world than it was before. 13:46And so how do you get a  consistent system of record 13:49of who are the users who should  have and do have access to your 13:52systems without looking in  dozens of different places? 13:55So, that's a huge point here. 13:57Number six: 13:58the sixth of the seven critical elements  for identity fabric is identity governance. 14:05So what that means is, once we know who these  users are and what access they should have, 14:12how do we actually consistently manage that? 14:15That's where identity governance comes in. 14:17And the seventh and final critical  element to any identity fabric 14:22is the concept of privilege access management. 14:26And that is for all of our  privileged user accounts. 14:29How do we effectively manage those things as  consistently as we do for all these other things? 14:35So this is what the identity fabric is. 14:38It cuts through the fantasy that 14:41all I need to worry about is that one  strategic identity provider and one 14:46strategic directory, because that's not reality. 14:49It can be your reality, but you're going to be  left with the same message you have already. 14:53The identity fabric with these seven elements 14:56is what actually allows you to take a user 14:59and their identity or identities, and manage  them consistently across this whole thing. 15:04We're very proud at IBM because our IBM  Verify Identity Access Management portfolio - 15:09we've actually added, we've been  working for years on this now. 15:13And late last year we actually came  out with all of this functionality. 15:17And so we're very proud that our IBM Verify  stack allows you to do identity orchestration 15:22across any identity provider, not just ours. 15:26We can do identity threat detection and response. 15:29We can onboard legacy applications quickly. 15:32We apply risk based authentication by 15:34integrating literally the leading  technology in the banking sector, 15:38from our acquisition of  Trusteer, into the identity stack 15:41to provide a real time risk assessment  for every user inside of the systems. 15:46We've been doing directory syncing  consolidation for 25 years. 15:49We have world class identity, 15:51governance capability and world class  privilege account management capability. 15:55So that's what the identity fabric is and I look  forward to chatting with you about this again. 16:01If you like this video and want to see more  like it, then please like and subscribe. 16:07Feel free to leave your thoughts  in the comments section below.