In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
This article introduces how to analyze the access security of SaaS cloud service applications. The content is very detailed. Interested friends can use it for reference. I hope it will be helpful to you.
More and more organizations are turning to software-as-a-service (SaaS cloud services) as a way to address enterprise needs without having to bear the burden of managing and maintaining applications. As a user of SaaS cloud services, you must get assurance from the supplier that they fully protect the data in your property. But when it comes to integrating cloud-based applications using local applications, consistency and access management are your responsibility.
Integrating SaaS cloud services with local applications will not change security practices much as broader governance emerges. This becomes a question, "how do you establish a rule on who can use cloud resources and how to use them," Jason Bloomberg said.
"the initial consideration has to do with identity management. If you have a third-party SaaS cloud service application, then you won't discover the identity and permissions of all internal users," Bloomberg said. For example, SaaS cloud service applications may provide access control, but they do not control usage permissions within the organization.
When a local application needs to interact with an Internet-based application, the local application needs to "tell" the cloud-based application that the user is indeed authorized to do everything he or she wants to do. This is one thing that is tagged to the cloud by authorization, Bloomberg explained.
Cloud providers have different support for fine-grained control of user offerings, so they can suggest permissions for a variety of functions. Typically, a SaaS cloud service provider provides only one login to a user, or allows you to access their system and provide users. It will be set up differently depending on the environment of the internal user. This has become a challenge. How do you extend your identity management to the cloud? " Bloomberg said.
In some cases, SaaS cloud service providers may provide functionality to access their applications using enterprise identity. For example, SalesForce Identity, recently introduced by SalesForce, provides a single, reliable identity that can be used to access all enterprise applications. However, not all SaaS cloud service providers provide this capability, and the responsibility lies with the users.
"from the perspective of SaaS cloud service providers, WYSIWYG," Bloomberg said. "the challenge is to fundamentally provide internal users with products for using third-party applications, and then establish and strengthen specifications on who can use that application and essentially federate identity to the cloud," he said.
Third-party solutions are like single sign-on services for SaaS cloud service applications. These federated authentication technologies rely on an identity that represents the successful identification of individual and business registrations and passes that identity to the application without exposure, Crawford explained.
Federated authentication technology is located in the local demilitarized zone (demilitarized zone) and manages all requests from local applications to SaaS cloud service applications. "all requests from local applications must be controlled. And the only way is through this alternate governance tool. It is the governance tool to determine whether all requests are properly authorized," Bloomberg said.
These federated authentication tools, also known as cloud governance tools, cloud governance applications and identity management as a service, are the product of single sign-on. Objectively speaking, users have separate usernames and passwords for their local applications. The IT organization is trying to take full advantage of single sign-on in these resources and has successfully used Microsoft Active Directory to enable users to access Microsoft resources with a user name and login. Similarly, federated authentication allows users to log in to a Web application and make other access. "Let's now look at extending the SaaS cloud services environment to a broader functionality by empowering users more seamlessly," Crawford said.
This is the end of how to analyze the access security of SaaS cloud service applications. I hope the above content can be helpful to you and learn more. If you think the article is good, you can share it for more people to see.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.