Does your IAM solution really need an Agent?

Most IAM tools utilize browser extensions or applications installed on the end-user’s machine, or on an Active Directory, for access to identity. But why?! A user can be identified even without an agent – so having an so-called ‘lightweight agent’ sitting in your Active Directory itself is not the most secure way to manage user identity.

Whenever you create a dependency to achieve a particular solution, it is important to ensure the solution is 100% secure and that applies for the dependencies (Agents) too. This could make the architecture slightly complicated, depending on how it works.

Another important factor against the use of an Agent-based architecture is that  you have to trust the Agent not to exceed its scope. This is very important because even many of the applications and services that we trust these days are not actually secure, and many act beyond their scope. For example, as per Digital Content Next, even the big boy of the tech industry, Google, still collects user location information even after turning off location settings.

So the big question is, when the things can be done without an agent, then why use an agent at all? People say it is for efficiency, and may be they are right. But is this worth the compromise on transparency and security?

Control your Cloud!

Join our mailing list to know how you can control your cloud better.

You have Successfully Subscribed!

Share
Published by
Dinesh Harikrishnan

Recent Posts

The AI Revolution: Transforming Cybersecurity

Author: Dinesh Reading Time: 3 mins In the past few months, it seems that any…

9 months ago

Blockchain Technology: A new chapter in Identity & Access Management

Author: Baskar Reading time: 3 mins Why do you need an IAM? These tools help…

10 months ago

Passwordless Authentication: Why you need it, how it works, and how Akku takes it further

  How do you strengthen your identity verification processes? Most organizations go the route of…

10 months ago

Contact us

11 months ago

Security isn’t a one-time investment: 3 key areas where most organizations fail

Your management team says that the time has come to invest in your organization’s cybersecurity.…

1 year ago