{"id":7293,"date":"2022-02-08T13:40:02","date_gmt":"1970-01-01T00:33:42","guid":{"rendered":"https:\/\/yawave.com\/?post_type=publication&#038;p=7293"},"modified":"2022-12-05T11:40:34","modified_gmt":"2022-12-05T10:40:34","slug":"identity-and-access-management-key-technology-for-user-portals","status":"publish","type":"post","link":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/","title":{"rendered":"Identity and Access Management: Key Technology for User Portals"},"content":{"rendered":"\n<div class=\"bee-page-container\">\n<div class=\"bee-row bee-row-1\">\n<div class=\"bee-row-content\">\n<div class=\"bee-col bee-col-1 bee-col-w12\">\n<div class=\"bee-block bee-block-1 bee-text\">\n<div style=\"font-size: 14px; line-height: 180%; font-family: Proxima Nova, sans-serif; color: #434b54;\" class=\"bee-text-content\">\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">Corporate user portals need a number of important technological factors to be successful. Successful means that they are accepted by customers and that an active and loyal community forms there, which shares content, grows and increases the company&#8217;s sales in the long term. Customers will only do this if they can assume that their data is secure and if it is made easy for them to log into the user portal and connected channels. The operating organization, in turn, must not only ensure the security of its customers, but also protect its own systems externally. &nbsp;<\/span><\/p>\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">I would like to introduce a key technology that is crucial for this: Identity and Access Management (IAM). IAM occupies a central position in the technical infrastructure of user portals; however, there are several other building blocks that are not considered here. Setting up a user portal and securing it internally and externally are complex and anything but trivial. &nbsp;<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"bee-block bee-block-2 bee-heading\">\n<h2 style=\"color:#0094de;direction:ltr;font-family:Proxima Nova, sans-serif;font-size:28px;font-weight:400;letter-spacing:normal;line-height:120%;text-align:left;margin-top:0;margin-bottom:0;\">1. Identity and Access Management <\/h2>\n<\/p><\/div>\n<div class=\"bee-block bee-block-3 bee-text\">\n<div style=\"font-size: 12px; line-height: 180%; font-family: Proxima Nova, sans-serif; color: #434b54;\" class=\"bee-text-content\">\n<p style=\"font-size: 17px; line-height: 30px;\"><span style=\"font-size: 17px; line-height: 30px;\">To operate a user portal professionally, you need an IAM system. IAM includes all internal policies and tools that IT departments use to grant access rights to various applications and systems and to manage digital entities. Such identities can be either natural persons or technical identities (software, IoT hardware). IAM systems thus represent an important element of cybersecurity by providing secure access to corporate resources.<\/span><\/p>\n<p style=\"font-size: 17px; line-height: 30px;\"><span style=\"font-size: 17px; line-height: 30px;\">The first main task of an IAM system is to <strong style=\"\">authenticate entities <\/strong>whenever a user requests access. In the simplest case, the username and password are checked against the company&#8217;s own database. Meanwhile, multifactor authentication and adaptive authentication are used due to security concerns. &nbsp;<\/span><\/p>\n<p style=\"font-size: 17px; line-height: 30px;\"><span style=\"font-size: 17px; line-height: 30px;\">The second main IAM task is the <strong style=\"\">authorization<\/strong> of the authenticated entity. The entity&#8217;s access rights are verified and depending on the assigned role, it is granted access to the appropriate resource level.<\/span><\/p>\n<p style=\"font-size: 17px; line-height: 30px;\"><span style=\"font-size: 17px; line-height: 30px;\">Another key function of IAM systems is <strong style=\"\">managing user identities<\/strong>, i.e. creating, editing and deleting users. For this purpose, the systems can be synchronized with directories such as Microsoft Active Directory. Users are assigned one or more roles according to previously created IAM policies, with which certain rights are associated.<\/span><\/p>\n<p style=\"font-size: 17px; line-height: 30px;\"><span style=\"font-size: 17px; line-height: 30px;\"><strong style=\"\">Single sign-on<\/strong> is not just another IAM feature, but a complete key technology principle. The most powerful IAM systems offer it as well, but in my eyes it deserves to be considered separately.<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"bee-block bee-block-4 bee-heading\">\n<h2 style=\"color:#0094de;direction:ltr;font-family:Proxima Nova, sans-serif;font-size:28px;font-weight:400;letter-spacing:normal;line-height:120%;text-align:left;margin-top:0;margin-bottom:0;\">2. Single Sign-On <\/h2>\n<\/p><\/div>\n<div class=\"bee-block bee-block-5 bee-text\">\n<div style=\"font-size: 14px; line-height: 180%; font-family: Proxima Nova, sans-serif; color: #434b54;\" class=\"bee-text-content\">\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">With Single Sign-On (SSO), your end users only need to authenticate once in your User Portal or on another authorized instance, such as Gmail or Facebook. As soon as this external instance reports a successful login back to the user portal, the user is logged in to all connected systems such as social media channels. This significantly facilitates customer engagement and improves the customer experience. &nbsp; &nbsp;<\/span><\/p>\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">Entering the password once saves time and delivers additional security, as the customer only needs to remember one password and only one password needs to be transmitted. Since users only need to authenticate at a single point, it can be better secured and verified for correctness (URL, SSL server certificate).&nbsp;<\/span><\/p>\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">SSO is initially a higher-level technical principle. There are different solution approaches for SSO. In the <strong style=\"\">media solution<\/strong>, the user uses an electronic token (USB, Bluetooth) to be authenticated. In the <strong style=\"\">local solution<\/strong>, users install a client on their regularly used workstation that automatically fills in logon masks with user name and password. When using a <strong style=\"\">ticketing system <\/strong>for SSO, a network of trusted services is established. The user is assigned a ticket as a &#8220;trusted user&#8221; when logging in to one of these services, which logs him\/her in for all other services in the network. Finally, in the <strong style=\"\">portal solution<\/strong>, the user logs into a portal and is authenticated and blanket authorized for each application integrated within the portal. In the case of web-based services, for example, this can be done using HTTP cookies or a dencentral protocol such as OpenID.<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"bee-block bee-block-6 bee-heading\">\n<h2 style=\"color:#0094de;direction:ltr;font-family:Proxima Nova, sans-serif;font-size:28px;font-weight:400;letter-spacing:normal;line-height:120%;text-align:left;margin-top:0;margin-bottom:0;\">3. SSO via OpenID <\/h2>\n<\/p><\/div>\n<div class=\"bee-block bee-block-7 bee-text\">\n<div style=\"font-size: 14px; line-height: 180%; font-family: Proxima Nova, sans-serif; color: #434b54;\" class=\"bee-text-content\">\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">OpenID is a decentralized authentication system for web-based services. A user who has registered once with an OpenID provider receives a URL-based identity, the OpenID. This allows him to log in to all websites that support OpenID. Since OpenID is decentralized and available exclusively as open source software, anyone can become an OpenID provider and operate an OpenID server with relatively little effort. This has led to the widespread adoption of OpenID, with small and medium-sized providers contributing as much as big tech.<\/span><\/p>\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">This global spread and popularity of OpenID is its greatest asset, but the technology behind it is vulnerable to phishing attacks. As a result, it is increasingly being supplanted by OAuth and OpenID Connect, which offer more security configuration options. &nbsp;&nbsp;<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"bee-block bee-block-8 bee-heading\">\n<h2 style=\"color:#0094de;direction:ltr;font-family:Proxima Nova, sans-serif;font-size:28px;font-weight:400;letter-spacing:normal;line-height:120%;text-align:left;margin-top:0;margin-bottom:0;\">4. SSO via Realms <\/h2>\n<\/p><\/div>\n<div class=\"bee-block bee-block-9 bee-text\">\n<div style=\"font-size: 14px; line-height: 180%; font-family: Proxima Nova, sans-serif; color: #434b54;\" class=\"bee-text-content\">\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">In IT, a <strong style=\"\">&#8220;realm&#8221;<\/strong> refers to the totality of all entries in a directory or the directory itself within a directory service such as Active Directory. This can be all human users and technical entities using the IT system of a company, or the members of a user portal. When such directory services are used as a ticketing system for SSO, the realm tells the application which instance of a directory service to authenticate against. It shows it where the requested user account is located for which an SSO ticket should be requested.<\/span><\/p>\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">A distributed SSO authentication service for open computer networks such as the Internet that uses tickets and realms is <strong style=\"\">Kerberos<\/strong>. Developed at MIT in 1978, Kerberos can be used for secure authentication on TCP\/IP networks. Passwords no longer need to be transmitted over the network and are replaced by tickets. A Kerberos server only manages accounts that belong to its realm; a computer can only belong to one realm at a time. In order to access services in other realms via Kerberos, trust positions must be established between the individual realms. Kerberos has been Microsoft&#8217;s standard protocol for SSO authentication since Windows Server version 2000\/2003 and client version Windows 2000\/XP. The Kerberos keys are stored in Active Directory. There are already Kerberos implementations for other operating systems such as macOS, Linux and FreeBSD. &nbsp;&nbsp;<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"bee-block bee-block-10 bee-heading\">\n<h2 style=\"color:#0094de;direction:ltr;font-family:Proxima Nova, sans-serif;font-size:28px;font-weight:400;letter-spacing:normal;line-height:120%;text-align:left;margin-top:0;margin-bottom:0;\">5. Permission Handling: Role Based Access Control <\/h2>\n<\/p><\/div>\n<div class=\"bee-block bee-block-11 bee-text\">\n<div style=\"font-size: 14px; line-height: 180%; font-family: Proxima Nova, sans-serif; color: #434b54;\" class=\"bee-text-content\">\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">As soon as your user portal grows, it becomes too time-consuming, confusing and therefore error-prone to give each real user direct rights and access to different systems. For multi-user systems such as user portals, it makes sense to assign user roles, where rights are abstracted based on work processes.<\/span><\/p>\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">Role Based Access Control (RBAC) is considered to be the best practice for role-based management of user rights and for controlling access to files or services. RBAC was described by Ferraiolo and Kuhn in 1992, adopted as an ANSI standard in 2004, and is in use on Microsoft Active Directory and SQL Server, SELInux, FreeBSD, Solaris, Oracle RDBMS, SAP R\/3, and many other systems.&nbsp;<\/span><\/p>\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">First, one or more roles are assigned to each user. One or more group memberships are attached to each role. Roles and group memberships determine the access rights of a user. Read, write and execute are the most common rights controlled via RBAC. Fortunately for the operators of user portals and online communities, it does not stop there. Rights such as administer, curate, share or create members are extended beyond the &#8220;normal&#8221; members of a community to include moderators, administrators, community managers and other users of the user portal. &nbsp;<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"bee-block bee-block-12 bee-heading\">\n<h2 style=\"color:#0094de;direction:ltr;font-family:Proxima Nova, sans-serif;font-size:28px;font-weight:400;letter-spacing:normal;line-height:120%;text-align:left;margin-top:0;margin-bottom:0;\">6. Open Source IAM: Keycloak <\/h2>\n<\/p><\/div>\n<div class=\"bee-block bee-block-13 bee-text\">\n<div style=\"font-size: 14px; line-height: 180%; font-family: Proxima Nova, sans-serif; color: #434b54;\" class=\"bee-text-content\">\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">They really do exist: free and yet powerful IAM systems. I would like to briefly introduce one of them to you, because we have had good experiences with it at yawave: &nbsp;Keycloak. Keycloak currently runs on Apache License 2.0 and supports three security protocols: OpenID Connect, OAuth 2.0 and SAML 2.0. It supports not only single sign-on, but also single sign-out and provides the user with a comfortable, web-based GUI as an admin console. Keycloak can be used as a standalone IAM system because it allows you to create user databases with user-defined roles and groups. This information can be further used to authenticate users within your application and secure parts of them based on predefined roles. Keycloak allows synchronization with your user database. By default, LDAP and Active Directory are supported, but you can create custom extensions for any user database using the Keycloak User Storage API. Additionally, Keycloak allows you to use social identity providers. It provides out-of-the-box support for Google, Twitter, Facebook and Stack Overflow, but you have to configure them all manually through the admin panel. Keycloak lets you customize all the pages that are displayed to your users. The pages are set up in .ftl format, so you can use classic HTML markups and CSS styles to customize them to your brand and UX design. You can even insert custom JS scripts. Plus, there&#8217;s a large and helpful support community.<\/span><\/p>\n<p style=\"line-height: 30px; font-size: 17px;\"><span style=\"font-size: 17px; line-height: 30px;\">On the downside, opting for Keycloak could be a disadvantage if you&#8217;re only running a single application with only one client in the Keycloak realm &#8211; then you lose all the benefits of SSO. If you don&#8217;t use social login or allow it for your user portal, Keycloak might not be the right choice either. Using Keycloak as a pure user database is also not suitable, you can better use a database with specific tables, which is easier to configure. Last, not least Keycloak is an open source project. If you are looking for a manufacturer warranty or individual 24h support, you are wrong.<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"bee-block bee-block-14 bee-heading\">\n<h2 style=\"color:#0094de;direction:ltr;font-family:Proxima Nova, sans-serif;font-size:28px;font-weight:400;letter-spacing:normal;line-height:120%;text-align:left;margin-top:0;margin-bottom:0;\"><span class=\"tinyMce-placeholder\">Conclusion<\/span> <\/h2>\n<\/p><\/div>\n<div class=\"bee-block bee-block-15 bee-text\">\n<div style=\"font-size: 14px; line-height: 180%; font-family: Proxima Nova, sans-serif; color: #434b54;\" class=\"bee-text-content\">\n<p style=\"line-height: 21px;\"><span style=\"font-size: 17px; line-height: 30px;\">Without selecting and using the appropriate key technologies and processes such as IAM and RBAC, your user portal will not be successful in the long term. I would be pleased if this article could provide you with a few pointers on what you should pay attention to.<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The targeted handling of identities and access rights is the central element for unleashing the potential of a user portal.  <\/p>\n","protected":false},"author":1,"featured_media":8911,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[108,131],"tags":[125],"dipi_cpt_category":[],"class_list":["post-7293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-homepage-2","category-user-hub","tag-blog-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity and Access Management: Key Technology for User Portals - yawave User Interaction Suite<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity and Access Management: Key Technology for User Portals - yawave User Interaction Suite\" \/>\n<meta property=\"og:description\" content=\"The targeted handling of identities and access rights is the central element for unleashing the potential of a user portal.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/\" \/>\n<meta property=\"og:site_name\" content=\"yawave User Interaction Suite\" \/>\n<meta property=\"article:published_time\" content=\"1970-01-01T00:33:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-05T10:40:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/yawave.com\/wp-content\/uploads\/2022\/02\/httpss3.eu-central-1.amazonaws.commedia.prod.yawaveyawave_publicationlanding_page2022-03b30f758b-5891-4973-a58d-5eb154f5613c.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"580\" \/>\n\t<meta property=\"og:image:height\" content=\"346\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"yawave\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"yawave\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/\"},\"author\":{\"name\":\"yawave\",\"@id\":\"https:\\\/\\\/yawave.com\\\/de\\\/#\\\/schema\\\/person\\\/dda5b0352a8f7e27fa4ce0613f386646\"},\"headline\":\"Identity and Access Management: Key Technology for User Portals\",\"datePublished\":\"1970-01-01T00:33:42+00:00\",\"dateModified\":\"2022-12-05T10:40:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/\"},\"wordCount\":1621,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/yawave.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/yawave.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/httpss3.eu-central-1.amazonaws.commedia.prod.yawaveyawave_publicationlanding_page2022-03b30f758b-5891-4973-a58d-5eb154f5613c.jpg\",\"keywords\":[\"Blog\"],\"articleSection\":[\"News Homepage\",\"User Hub\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/\",\"url\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/\",\"name\":\"Identity and Access Management: Key Technology for User Portals - yawave User Interaction Suite\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yawave.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/yawave.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/httpss3.eu-central-1.amazonaws.commedia.prod.yawaveyawave_publicationlanding_page2022-03b30f758b-5891-4973-a58d-5eb154f5613c.jpg\",\"datePublished\":\"1970-01-01T00:33:42+00:00\",\"dateModified\":\"2022-12-05T10:40:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/yawave.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/httpss3.eu-central-1.amazonaws.commedia.prod.yawaveyawave_publicationlanding_page2022-03b30f758b-5891-4973-a58d-5eb154f5613c.jpg\",\"contentUrl\":\"https:\\\/\\\/yawave.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/httpss3.eu-central-1.amazonaws.commedia.prod.yawaveyawave_publicationlanding_page2022-03b30f758b-5891-4973-a58d-5eb154f5613c.jpg\",\"width\":580,\"height\":346},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/identity-and-access-management-key-technology-for-user-portals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/yawave.com\\\/en\\\/user-interaction-suite\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity and Access Management: Key Technology for User Portals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/yawave.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/yawave.com\\\/de\\\/\",\"name\":\"yawave User Interaction Suite\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/yawave.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/yawave.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/yawave.com\\\/de\\\/#organization\",\"name\":\"yawave\",\"url\":\"https:\\\/\\\/yawave.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/yawave.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/yawave.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/yawave_logo_blau.png\",\"contentUrl\":\"https:\\\/\\\/yawave.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/yawave_logo_blau.png\",\"width\":150,\"height\":29,\"caption\":\"yawave\"},\"image\":{\"@id\":\"https:\\\/\\\/yawave.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/yawave.com\\\/de\\\/#\\\/schema\\\/person\\\/dda5b0352a8f7e27fa4ce0613f386646\",\"name\":\"yawave\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f5f4a840a5b8fc87d952da8d901809cd839889bc1263288fbbdb74d3f86cf872?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f5f4a840a5b8fc87d952da8d901809cd839889bc1263288fbbdb74d3f86cf872?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f5f4a840a5b8fc87d952da8d901809cd839889bc1263288fbbdb74d3f86cf872?s=96&d=mm&r=g\",\"caption\":\"yawave\"},\"sameAs\":[\"http:\\\/\\\/localhost:8888\"],\"url\":\"https:\\\/\\\/yawave.com\\\/en\\\/blog\\\/author\\\/yawave\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity and Access Management: Key Technology for User Portals - yawave User Interaction Suite","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/","og_locale":"en_US","og_type":"article","og_title":"Identity and Access Management: Key Technology for User Portals - yawave User Interaction Suite","og_description":"The targeted handling of identities and access rights is the central element for unleashing the potential of a user portal.","og_url":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/","og_site_name":"yawave User Interaction Suite","article_published_time":"1970-01-01T00:33:42+00:00","article_modified_time":"2022-12-05T10:40:34+00:00","og_image":[{"width":580,"height":346,"url":"https:\/\/yawave.com\/wp-content\/uploads\/2022\/02\/httpss3.eu-central-1.amazonaws.commedia.prod.yawaveyawave_publicationlanding_page2022-03b30f758b-5891-4973-a58d-5eb154f5613c.jpg","type":"image\/jpeg"}],"author":"yawave","twitter_card":"summary_large_image","twitter_misc":{"Written by":"yawave","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/#article","isPartOf":{"@id":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/"},"author":{"name":"yawave","@id":"https:\/\/yawave.com\/de\/#\/schema\/person\/dda5b0352a8f7e27fa4ce0613f386646"},"headline":"Identity and Access Management: Key Technology for User Portals","datePublished":"1970-01-01T00:33:42+00:00","dateModified":"2022-12-05T10:40:34+00:00","mainEntityOfPage":{"@id":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/"},"wordCount":1621,"commentCount":0,"publisher":{"@id":"https:\/\/yawave.com\/de\/#organization"},"image":{"@id":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/#primaryimage"},"thumbnailUrl":"https:\/\/yawave.com\/wp-content\/uploads\/2022\/02\/httpss3.eu-central-1.amazonaws.commedia.prod.yawaveyawave_publicationlanding_page2022-03b30f758b-5891-4973-a58d-5eb154f5613c.jpg","keywords":["Blog"],"articleSection":["News Homepage","User Hub"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/","url":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/","name":"Identity and Access Management: Key Technology for User Portals - yawave User Interaction Suite","isPartOf":{"@id":"https:\/\/yawave.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/#primaryimage"},"image":{"@id":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/#primaryimage"},"thumbnailUrl":"https:\/\/yawave.com\/wp-content\/uploads\/2022\/02\/httpss3.eu-central-1.amazonaws.commedia.prod.yawaveyawave_publicationlanding_page2022-03b30f758b-5891-4973-a58d-5eb154f5613c.jpg","datePublished":"1970-01-01T00:33:42+00:00","dateModified":"2022-12-05T10:40:34+00:00","breadcrumb":{"@id":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/#primaryimage","url":"https:\/\/yawave.com\/wp-content\/uploads\/2022\/02\/httpss3.eu-central-1.amazonaws.commedia.prod.yawaveyawave_publicationlanding_page2022-03b30f758b-5891-4973-a58d-5eb154f5613c.jpg","contentUrl":"https:\/\/yawave.com\/wp-content\/uploads\/2022\/02\/httpss3.eu-central-1.amazonaws.commedia.prod.yawaveyawave_publicationlanding_page2022-03b30f758b-5891-4973-a58d-5eb154f5613c.jpg","width":580,"height":346},{"@type":"BreadcrumbList","@id":"https:\/\/yawave.com\/en\/blog\/identity-and-access-management-key-technology-for-user-portals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/yawave.com\/en\/user-interaction-suite\/"},{"@type":"ListItem","position":2,"name":"Identity and Access Management: Key Technology for User Portals"}]},{"@type":"WebSite","@id":"https:\/\/yawave.com\/de\/#website","url":"https:\/\/yawave.com\/de\/","name":"yawave User Interaction Suite","description":"","publisher":{"@id":"https:\/\/yawave.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yawave.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/yawave.com\/de\/#organization","name":"yawave","url":"https:\/\/yawave.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yawave.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/yawave.com\/wp-content\/uploads\/2022\/05\/yawave_logo_blau.png","contentUrl":"https:\/\/yawave.com\/wp-content\/uploads\/2022\/05\/yawave_logo_blau.png","width":150,"height":29,"caption":"yawave"},"image":{"@id":"https:\/\/yawave.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/yawave.com\/de\/#\/schema\/person\/dda5b0352a8f7e27fa4ce0613f386646","name":"yawave","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f5f4a840a5b8fc87d952da8d901809cd839889bc1263288fbbdb74d3f86cf872?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f5f4a840a5b8fc87d952da8d901809cd839889bc1263288fbbdb74d3f86cf872?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f5f4a840a5b8fc87d952da8d901809cd839889bc1263288fbbdb74d3f86cf872?s=96&d=mm&r=g","caption":"yawave"},"sameAs":["http:\/\/localhost:8888"],"url":"https:\/\/yawave.com\/en\/blog\/author\/yawave\/"}]}},"_links":{"self":[{"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/posts\/7293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/comments?post=7293"}],"version-history":[{"count":8,"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/posts\/7293\/revisions"}],"predecessor-version":[{"id":15147,"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/posts\/7293\/revisions\/15147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/media\/8911"}],"wp:attachment":[{"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/media?parent=7293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/categories?post=7293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/tags?post=7293"},{"taxonomy":"dipi_cpt_category","embeddable":true,"href":"https:\/\/yawave.com\/en\/wp-json\/wp\/v2\/dipi_cpt_category?post=7293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}