Published: 06 July 2016
Summary
A new technology, blockchain for IAM applications, debuts in this research to a great deal of hype. The SCIM user provisioning standard and IAM as-a-service matured. Several technologies made it to or near the Plateau of Productivity, reflecting an overall trend toward maturity for IAM.
Included in Full Research
- What You Need to Know
- The Hype Cycle
- The Priority Matrix
- Off the Hype Cycle
- On the Rise
- User-Managed Access (UMA)
- Blockchain for IAM
- Internet of Things Authentication
- OpenID Connect
- User and Entity Behavior Analytics
- SCIM
- At the Peak
- Full Life Cycle API Management
- Sliding Into the Trough
- Mobile Single Sign-On
- OAuth
- IDaaS
- Externalized Authorization Management
- Common Access Cards
- Enterprise Digital Rights Management
- Climbing the Slope
- IAM Managed Services
- Biometric Authentication Methods
- Identity Governance and Administration
- Privileged Access Management
- X.509 Tokens for User Authentication
- Entering the Plateau
- Identity-Proofing Services
- Virtual Directories
- Phone-as-a-Token Authentication Methods
- SIEM
- Electronic Signature
- Federated Identity Management
- IAM Professional Services
- Appendixes
- Hype Cycle Phases, Benefit Ratings and Maturity Levels