The integration of technical identities presents a challenge for current Identity and Access Management solutions. Until now, the relationships between different human identities have mostly been mapped hierarchically. With technical identities that are used by several human identities, this is only possible to a limited extent. Besides relationships, the life cycle of identities must be reconsidered as well. While this was initially relatively manageable through entry, transfer and exit, life cycles have already been expanded in recent years to include first contact, hiring date, transition date, and only end with the death of the identity. The obvious challenges are the increase of LifeCycle states, relationships in general, complex relationships between entities and more frequent transfers.
Both technical and human identities require authentication and have different roles that assign only necessarily required rights. Numerous applications and the authentication processes associated therewith pose not only a security risk but also an unnecessary slowdown in work.
The challenge here is the fact that complex IoT units feature almost human characteristics and must therefore also be treated accordingly with regard to risk factors. One solution is the complete integration of IoT in IAM environments.