MODERNIZING IDENTITY MANAGEMENT: TRANSITIONING FROM LEGACY SYSTEMS TO SSO IMPLEMENTATION

Authors

  • Kanaka Maheswara Rao Chennuri Jawaharlal Nehru Technological University, Hyderabad, India Author

Keywords:

Identity Management Modernization, Single Sign-On Implementation, Zero Trust Architecture, Security Framework Migration, Legacy System Integration

Abstract

This article examines the critical transition from legacy identity management systems to modern Single Sign-On (SSO) implementations, highlighting the evolution of authentication frameworks and their impact on enterprise security architecture. The article investigates the challenges organizations face during migration, focusing on security enhancement, user experience improvement, and operational efficiency. Through comprehensive article analysis of current infrastructure, particularly Legacy Identity Management systems/ architectures the article identifies key limitations in meeting contemporary security requirements and integration capabilities. The article explores modern SSO solution architectures, emphasizing the importance of Zero Trust principles, multi-factor authentication, and identity-centric access control. The implementation strategy encompasses detailed migration planning, technical integration considerations, and security enhancement measures. The article also addresses service integration, testing methodologies, and deployment strategies, providing insights into effective rollout approaches and maintenance frameworks. By examining real-world implementations and industry best practices, this article offers valuable guidance for organizations undertaking identity management modernization initiatives.

References

Khalid Maidine; Ahmed El-Yahyaoui, "Cloud Identity Management Mechanisms and Issues," 2023 IEEE International Conference on Cloud Computing and Big Data (ICCCBD). https://ieeexplore.ieee.org/document/10366178

Yang ShuLin; Hu JiePing, "Research on Unified Authentication and Authorization in Microservice Architecture," 2020 IEEE 20th International Conference on Communication Technology (ICCT). https://ieeexplore.ieee.org/abstract/document/9295931

Fengming Nie; Feng Xu; Rongzhi Qi, "SAML-based single sign-on for legacy system | IEEE International Conference on Automation and Logistics, 2012. https://ieeexplore.ieee.org/document/6308228

S. Malek; M. Mikic-Rakic; N. Medvidovic, "A Style-Aware Architectural Middleware for Resource-Constrained, Distributed Systems," IEEE Transactions on Software Engineering, vol. 31, no. 3, pp. 256-272, Mar. 2005. https://ieeexplore.ieee.org/abstract/document/1423996

Microsoft, "Microsoft Entra ID (formerly Azure Active Directory)," Microsoft Security, 2024. https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id

Y. Shyshkin, "How To Choose An Integration Protocol," Aspiration and Advisory, 2021. https://www.aspirationandadvisory.com/blog/how-to-choose-an-integration-protocol

P. A. Hausler, R. C. Linger, C. J. Trammell, "Adopting Cleanroom Software Engineering with a Phased Approach," IBM Systems Journal, vol. 33, no. 1, pp. 89-109, 1994. https://ieeexplore.ieee.org/abstract/document/5387350

Zhenxiang Tu, Qian Li, "Design and Implementation of Unified Identity Management Based on SAML," 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 123-130, April 2012. https://ieeexplore.ieee.org/abstract/document/6201858

K.A. Qureshi, "Enterprises Application Integration," Proceedings of the IEEE Symposium on Emerging Technologies, 2005. https://ieeexplore.ieee.org/document/1558905

Yuan-Hsin Tung, Sheng-Chen Lo, Jen-Feng Shih, Hung-Fu Lin, "An Integrated Security Testing Framework for Secure Software Development Life Cycle," 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS). https://ieeexplore.ieee.org/document/7737238

Konstantinidis, Antonis Βillis, Christos Alexander Mouzakidis, Vasiliki Zilidou, "Design, implementation and wide pilot deployment of FitForAll: an easy to use exergaming platform improving physical fitness and life quality of senior citizens," IEEE Journal of Biomedical and Health Informatics, 2014. https://www.researchgate.net/publication/271013000_Design_Implementation_and_Wide_Pilot_Deployment_of_FitForAll_An_Easy_to_use_Exergaming_Platform_Improving_Physical_Fitness_and_Life_Quality_of_Senior_Citizens

Cho-Chin Lin, Yu-Chi Huang, Zong-De Jian, "A two-phase iterative pre-copy strategy for live migration of virtual machines," IEEE Transactions on Cloud Computing, 2012. https://ieeexplore.ieee.org/document/6268465

Published

2024-12-03

How to Cite

Kanaka Maheswara Rao Chennuri. (2024). MODERNIZING IDENTITY MANAGEMENT: TRANSITIONING FROM LEGACY SYSTEMS TO SSO IMPLEMENTATION. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY (IJRCAIT), 7(2), 1756-1768. https://ijrcait.com/index.php/home/article/view/IJRCAIT_07_02_137