Social Authentication’s loss might be IAM’s gain

Social authentication

The next decade is primed to see the rise of Identity and Access (IAM) management software, as more IT executives are looking to securing their network whilst still allowing authorized individuals access within the resources they need.

A recent survey on Pulse Q&A laid this out to bare, showing that nearly half of the 182 top-level executives were becoming more at ease with social authentications and agreed that they could provide a seamless, frictionless way to login to products or services. Another 34 percent strongly agreed that this was the case while the remaining 18 percent were against the idea of using social authentication to log in to products and services.

Furthermore, 83 percent of executives that took part in the survey believed that such social logins can scale application adoption by making it easy to sign up and eliminating registration forms.

This being said, most respondents on the survey were only willing to go so far. 81 percent agreed that the use of social logins that were directly integrated into customer facing applications affected their security posture. Only 19 percent of the executives believed that single sign-on offerings wouldn’t affect their security posture in the event of integrated customer-facing applications.

Greater adoption of IAM

In a recent interview with Pulse Q&A, former CIO of Okta Mark Settle spoke to the burgeoning promise of the industry, particularly as it applies to machine-to-machine interactions. “[A]s the whole IoT phenomena grows, sensors and different kinds of machines will authenticate to each other.

Make sure to catch our interview with Mark Settle, former CIO of Okta 

“A good example might be if you’re constructing drugs and the raw materials that are going to a drug or be delivered to you or me as a patient, the machine that’s delivering some of that raw material may have some certifications that have been applied to it, and the machine that’s going to be downstream and take possession of those materials and do whatever it’s going to do heat and mix them into the final drug, wants to start to have this electronic handshake so to speak. It says ‘I know that I’m taking raw material from a machine that’s gone through all the right FDA certifications etc’ So I think the explosion of identity-related capabilities to both think about authenticating those two scenarios are going to become more and more critical over time.”

IT leaders wary of Single Sign-On

Despite the growing use of social authentication to improve logins and application adoption, there remain IT leaders wary of its use in the workplace, with the overwhelming majority of survey respondents in favor of a strong IAM solution in addition to social authentication in order to mitigate security concerns with customer-facing applications. Major concerns include the disclosure of private information.

The Facebook breach, as well as the more recent hack that led to the revelation of more than 419 million phone numbers, may lead to more cautious approaches to Single Sign-On but wariness towards its shortcomings might, in the end, be a sign of success for the burgeoning IAM market.

1 comment

Leave a Reply

You May Also Like
Read More

The CISO as evangelist

Clarify Health CISO Fred Bret-Mounet has given much thought to the tension between securing a business and growing…