IAM basics
Introduction
Imagine oru big office building. Front la security guard iruppaan ā ID card check pannuvaan, visitor ah na register pannuvaan, certain floors ku access illa nu solluvan. š¢
Digital world la idhe same job panradhu dhaan IAM ā Identity and Access Management!
Yaaru login pannalam, yaaru enna access pannalam, yaaru enna panna allowed ā ivanga ellam control pannuradhu IAM. Indha article la IAM basics, concepts, and real examples paapom! š
What is IAM?
IAM = Identity and Access Management
Two main questions:
- Identity: "Nee yaaru?" ā Verify who you are
- Access: "Nee enna panna allowed?" ā What can you do
| Concept | Real World | Digital World |
|---|---|---|
| Identity | Aadhar Card, Passport | Username, Email |
| Authentication | Security guard ID check | Password, Biometric |
| Authorization | "VIP area allowed?" | Admin vs User role |
| Access Control | Room key card | File permissions |
Why IAM important?
- 80% of data breaches involve compromised credentials
- Companies average 187 apps use pannuranga ā access manage pannanum
- Compliance (GDPR, HIPAA) require proper access control
Authentication vs Authorization
Ivanga rendu most confused concepts:
Authentication (AuthN) šŖŖ
- "Prove who you are"
- Login process ā username + password
- Biometric ā fingerprint, face ID
- Result: Identity verified ā or rejected ā
Authorization (AuthZ) š
- "What are you allowed to do?"
- After authentication, permissions check
- Admin can delete files, User can only view
- Result: Access granted ā or denied ā
Analogy: Cinema theatre š¬
- Authentication = Ticket check at entrance (nee valid customer ah?)
- Authorization = Seat assignment (Gold class ah, Regular ah?)
First AuthN, then AuthZ ā always this order!
MFA ā Multi-Factor Authentication
MFA = 2 or more factors use panni identity verify pannuradhu.
Three types of factors:
š§ Something you KNOW ā Password, PIN, security question
š± Something you HAVE ā Phone (OTP), hardware token, smart card
š Something you ARE ā Fingerprint, face scan, iris scan
| MFA Combination | Example | Security Level |
|---|---|---|
| Password + OTP | Google login with SMS OTP | Medium |
| Password + Authenticator | GitHub with Google Authenticator | High |
| Password + Biometric | Banking app with fingerprint | High |
| Password + Hardware Key | YubiKey for admin accounts | Very High |
Why MFA matters: Password alone compromise aanalum, second factor illama hacker login panna mudiyaadhu! 99.9% of account attacks MFA prevent pannum. š”ļø
RBAC ā Role-Based Access Control
RBAC = Users ku roles assign panni, roles ku permissions assign pannuradhu.
Office example:
- CEO ā All departments access
- HR Manager ā HR files, employee data
- Developer ā Code repo, dev servers
- Intern ā Only shared documents
RBAC Benefits:
- Easy to manage ā role add/remove pannunga
- Principle of Least Privilege follow aagum
- Audit easy ā who has what access clear ah theriyum
Other access control models:
- ABAC (Attribute-Based) ā attributes based access (time, location, department)
- MAC (Mandatory) ā Government/military use, strict labels
- DAC (Discretionary) ā Owner decides who gets access
IAM Architecture
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā ā IAM ARCHITECTURE ā āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā⤠ā ā ā USER āāā¶ IDENTITY PROVIDER (IdP) ā ā ā ā ā āāā Authentication ā ā ā āāā Password ā ā ā āāā MFA/2FA ā ā ā āāā Biometric ā ā ā āāā SSO Token ā ā ā ā ā āāā Authorization ā ā ā āāā RBAC (Roles) ā ā ā āāā ABAC (Attributes) ā ā ā āāā Policies ā ā ā ā ā āāā Access Management ā ā āāā Provisioning ā ā āāā De-provisioning ā ā āāā Audit Logs ā ā ā ā āāāāāāāāāāā āāāāāāāāāāā āāāāāāāāāāā ā ā ā App 1 ā ā App 2 ā ā App 3 ā ā ā ā (Email) ā ā (CRM) ā ā (Code) ā ā ā āāāāāāāāāāā āāāāāāāāāāā āāāāāāāāāāā ā ā ā² ā² ā² ā ā āāāāāāāāāāāāāā¼āāāāāāāāāāāāā ā ā SSO / OAuth / SAML ā ā ā āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
SSO ā Single Sign-On
SSO = Oru login, multiple app access.
Without SSO š«:
- Gmail ā separate login
- YouTube ā separate login
- Google Drive ā separate login
- 10 apps = 10 passwords = 10 headaches!
With SSO š:
- Google account login ā Gmail, YouTube, Drive, Maps ā ellam access!
- One password to remember
- One place to manage security
SSO Protocols:
- SAML ā Enterprise SSO standard (XML-based)
- OAuth 2.0 ā Authorization framework ("Login with Google")
- OIDC ā OpenID Connect, identity layer on top of OAuth
- Kerberos ā Windows Active Directory uses this
SSO Risk: Single point of failure ā oru account compromise aana, all apps affected! Adhanalaa MFA essential. š
Real Scenario: New Employee Onboarding
Scenario: Kumar joins TCS as Junior Developer.
Day 1 ā IAM in action:
š HR creates Kumar's identity in Active Directory
š Kumar gets employee ID + temporary password
š§ Email account auto-provisioned (RBAC: "Developer" role)
š» Code repo access granted (Git, Jira, Confluence)
š« Finance systems ā NO access (not his role)
š± MFA setup ā Microsoft Authenticator install
Day 365 ā Kumar promoted to Tech Lead:
š Role change: Developer ā Tech Lead
ā New access: Team management tools, deployment servers
š Audit: All access changes logged
Kumar leaves company:
ā All access revoked immediately (de-provisioning)
š§ Email disabled, VPN removed, badges deactivated
This is IAM lifecycle management! š
Principle of Least Privilege
š Least Privilege = Give minimum access needed to do the job. Nothing more.
Why?
- Attack surface reduce aagum
- Accidental damage prevent aagum
- Compliance requirements meet aagum
Examples:
- Intern ku admin access venaam ā
- Developer ku production database direct access venaam ā
- HR ku source code repo access venaam ā
Implementation:
- Start with zero access, add as needed
- Regular access reviews (quarterly)
- Remove access immediately when not needed
- Temporary elevated access with approval workflow
"Need-to-know basis" ā military concept, but cybersecurity la gold standard! š
Popular IAM Tools
Industry la use aagura IAM tools:
| Tool | Type | Used By |
|---|---|---|
| **Azure AD** | Cloud IAM | Microsoft ecosystem |
| **Okta** | SSO + MFA | Enterprise |
| **Auth0** | Developer IAM | Startups, Apps |
| **AWS IAM** | Cloud IAM | AWS users |
| **Keycloak** | Open-source IAM | Self-hosted |
| **OneLogin** | SSO Platform | Enterprise |
| **CyberArk** | Privileged Access | Enterprise |
| **JumpCloud** | Directory-as-a-Service | SMBs |
Cloud IAM is booming ā every company cloud ku move aagum bodhu IAM first priority! āļø
Try It: IAM Policy Prompt
ā Summary & Key Takeaways
IAM basics recap:
ā IAM = Identity and Access Management
ā Authentication = Who are you? (verify identity)
ā Authorization = What can you do? (check permissions)
ā MFA = Multiple verification factors (password + OTP)
ā RBAC = Role-based permissions
ā SSO = One login, many apps
ā Least Privilege = Minimum access needed
Next article: "Password Security" ā strong passwords create pannuradhu, password managers, and passkeys! š
š Mini Challenge
Challenge: Build an IAM Policy for Startup
Oru tech startup la IAM system design pannunga:
- Role Definition ā 4 roles define pannunga: Admin, Developer, QA, Intern. Each role ku specific permissions decide pannunga (database access, deployment rights, code review).
- RBAC Implementation ā Oru spreadsheet create pannunga. Users list, roles assign, permissions matrix create pannunga. Least privilege principle follow pannunga.
- MFA Setup ā Un personal devices la Google Authenticator, Authy, or Microsoft Authenticator install pannunga. Gmail, GitHub, AWS account la 2FA/MFA enable pannunga.
- SSO Simulation ā Okta trial account signup pannunga (free plan available). Single Sign-On configure pannunga. Multiple apps add pannunga, oru login use panni all access panna paappom.
- Access Audit ā Current access analyze pannunga. "Who has what access?" chart create pannunga. Unnecessary access identify panni remove pannunga (principle of least privilege).
- Offboarding Checklist ā Employee leave pannidha, access revoke enna steps pannuradhu? Checklist create pannunga ā systems, accounts, devices, keys ellam remove pannunga.
Certificate: Nee startup ka IAM architect! š
Interview Questions
Q1: IAM enna? Real-world analogy solli explain pannunga.
A: IAM = Right person, right time, right resource. Physical example: Office building la security guard. ID verify panni (authentication), employee ID scan panni (authorization), office access allow pannum. Digital la same concept.
Q2: Authentication vs Authorization ā clear difference solu.
A: Authentication = "Nee yaaru?" (I am Priya, password prove pannunga). Authorization = "Nee enna panna allowed?" (Priya, nee spreadsheet edit panna allowed, but salary data edit panna allowed ille).
Q3: MFA vs 2FA difference? Which is better?
A: 2FA = exactly 2 factors (usually password + OTP). MFA = 2 or more factors (password + OTP + biometric + security questions). MFA more secure. But 2FA already good protection ā 99.9% attacks block aagudhu.
Q4: SSO vs passwords ā SSO security risks?
A: SSO convenience increase panunum, single point of failure kuda create panunum. SSO account compromise-ael, all connected apps access lost. Mitigation: SSO provider security strong irukkanum, conditional access policies use pannunga, regular audit pannunga.
Q5: Company la new hire engineer onboard pannuradhu ā IAM process enna?
A: 1) Manager request approve panni 2) Orum necessary systems identify panni 3) Least privilege role assign panni 4) Accounts create panni 5) MFA setup ensure panni 6) Access test panni 7) Documentation complete panni.
Frequently Asked Questions
Password + OTP is an example of?