Lab 06: IAM Architecture
Objectives
Step 1: Enterprise IAM Architecture
┌─────────────────────────────────────────────────────────┐
│ IDENTITY FABRIC │
│ │
│ HR System ──→ Identity Store (AD/LDAP) ←── SCIM sync │
│ │ │
│ ┌─────────▼──────────┐ │
│ │ Identity Provider │ (Okta, Azure AD) │
│ │ - Authentication │ │
│ │ - MFA │ │
│ │ - Token issuance │ │
│ └─────────┬──────────┘ │
│ │ │
│ ┌─────────────┼─────────────┐ │
│ ▼ ▼ ▼ │
│ SAML 2.0 OAuth2/OIDC Kerberos │
│ (Enterprise (Modern apps, (Windows/AD) │
│ SSO) APIs, mobile) │
└─────────────────────────────────────────────────────────┘
│
┌────▼───────────────────────────────────┐
│ Applications & Resources │
│ Web Apps │ APIs │ Cloud │ On-prem │
└────────────────────────────────────────┘Step 2: SAML 2.0 Flow
Step 3: OAuth 2.0 / OIDC Flows
Grant Type
Use Case
Security
Step 4: JWT Builder + RBAC Engine
Step 5: Access Control Models Comparison
Model
Best For
Complexity
Flexibility
Step 6: SCIM Provisioning
Step 7: PAM and JIT Access
Feature
Description
Example Tool
Step 8: Capstone — Enterprise IAM Design
Summary
Concept
Key Points
Last updated
