Identity management (IdM) solutions ensure that authorized users — and only authorized users — can access the resources they need. By encompassing organization-wide policies and technologies, these solutions properly identify, authenticate, and authorize access to assets through identities, attributes, credentials, and certificates.
This chapter discusses key identity management capabilities for adopting zero trust.
Identity store
A domain controller allows you to manage identities, access, and policies for users, services, and hosts. Included with Red Hat Enterprise Linux, Red Hat Identity Management is a centralized identity store and domain controller that helps reduce administrative overhead, simplify security management, and ensure consistency across your environment. With it, you can store all identities in one place, consolidate operations, and apply policies uniformly across resources and environments. Simplified domain registration lets you create a trusted security boundary, while streamlined authentication improves the overall end user experience.
Single sign-on
In zero trust architectures, each service, device, and server requires separate access authentication. Single sign-on (SSO) systems simplify access by using a central identity service to allow servers to check for verified users. Red Hat Enterprise Linux supports OAuth 2.0 and Red Hat Identity Management to allow users to authenticate once and access multiple services, providing a streamlined experience. Integration with various services — including Red Hat’s single sign-on technology, Microsoft AzureAD, and GitHub — lets you continue to use your existing identity services while providing flexibility for the future.
Integration with other identity management systems
Most organizations already use one or more identity management systems for their Linux and Windows environments. Integrating these systems into a single overall solution can help you centralize operations, ensure consistency across your organization, and improve administrative efficiency. Red Hat Identity Management natively integrates with Microsoft Active Directory so you can manage identities across mixed environments while applying tailored access control policies directly to your Red Hat Enterprise Linux domain.
Policy management
A policy-based approach to identity management can help you improve consistency, efficiency, and security. Red Hat Identity Management lets you set and apply policy-based controls from a centralized interface to ensure that identities, access, and resources are configured properly. Customizable identity and access policies help limit privilege escalations across your environment. And role-based access controls (RBAC) let you delegate identity management server administrative capabilities — including authentication and authorization management and session recording, auditing, and logging — across your team.
Certificate management
Digital certificates contain information needed to authenticate the identity of users, applications, websites, and other subjects. They should be created, monitored, renewed, and retired according to least privileges principles. Red Hat Identity Management supports complete life cycle management for user, host, and service certificates. You can also deploy Red Hat Certificate System, a certificate authority that supports advanced management activity like smart card provisioning, customized certificate types, and protected secret storage. Support for common protocols and standards — including X.509, Automatic Certificate Management Environment (ACME), Simple Certificate Enrollment Protocol (SCEP) and Secure Sockets Layer (SSL), and TLS — lets you create certificates that work with your IT ecosystem. Automatic tracking of certificate expiration dates ensures timely renewals. And public key infrastructure (PKI) authentication verifies that identities can be trusted.
Multifactor authentication
Multifactor authentication (MFA) adds an extra layer of security by requiring multiple checks to verify an identity before granting access. Red Hat Identity Management supports MFA via cryptographic devices like hardware tokens and smart cards. You can also select and configure multiple authentication types — including passwords, certificates, Remote Authentication Dial-In User Service (RADIUS), one-time passwords (OTP), and Public Key Cryptography for initial authentication (PKINIT) — and set default authentication methods for all users.