![]() ![]() The capabilities and features offered by these channels varies based on business needs. There is no support for the smart brute force attack and requires custom development.Ĭommerce sector has evolved over a period of time and is offering a multi – channel platform to meet end user requirements. If a commerce application wants to adopt these features, it needs to be built from scratch which requires significant time and effort. LDAP based approach lacks the latest security feature like two factor authentication, self -service password reset etc. A cloud based identity and access management solution is the natural choice for a cloud based commerce implementation. The recent industry trend has depicted a clear shift in direction from an on-premises based commerce implementation to a cloud based commerce implementation. Cloud based identity management has addressed this issue by providing a centralized authorization process. This ends up lot of repeated work and need optimization. If an enterprise has several applications, one needs to implement authorization in each application to control user access and provide the right access to the right users. What if, a user brings his social media identity to register to a commerce site without worrying about long registration process and maintaining multiple log-in ID password for all sites.This capability was missing in traditional LDAP based authentication and authorization.Īuthorization is another key aspect of cloud based identity management. If a customer has to register multiple sites, user needs to remember user ID password of each site. ![]() Historically commerce applications require a customer to share his/her identity by user registration.The customer needs to provide basic information which will be used to entitle customer for certain operations to a commerce site. However, this design lacks to meet some of the modern day requirements introduced by social media and cloud adoption. This design approach works well for most of the commerce implementation. Traditional approach is to maintain an on-premise LDAP directory to authenticate users.The customer’s profile is maintained in LDAP and is used for user authentication. User authentication and authorization is an integral part of any B2B or B2C implementation.
0 Comments
Leave a Reply. |