AN ANALYSIS OF AUTHENTICATION MODELS IN IDENTITY MANAGEMENT SYSTEMS, INCLUDING KERBEROS, AD, AZURE AD, OPEN AD, OPENLDAP, AND DATABASES

Main Article Content

Raja Viswanathan, Banumathi Arumugam, Manivel Kandasamy

Abstract

This research discusses the different types of authentication models used in identity management systems. Some models specifically mentioned are Kerberos, Active Directory (AD), Azure Active Directory (Azure AD), Open Active Directory (Open AD), and OpenLDAP. The identity management system is the security framework that manages the digital identity verifying authentication to determine the level of access to have specific resources followed by verified identity. The Need for IMS to ensure authorized individual access to organizational resources. While assessing each model's scalability, security features, and performance in various organizational environments, the study also looks at its use cases, shortcomings, and strengths. Kerberos is the network authentication protocol, that provides secure authentication through user services in client-server architecture. Validate identity to ensure about exchange of the relationship between the user and services. Advantages as strong security and time-based authentication. Azure Active Directory is a cloud-based solution, that helps businesses secure and manage to access the various ranges of on-premises and cloud-based app services. The advantage of this is to identify the security and protection with MFA and SSO. Open AD provides the directory service and identity management. The authentication process is similar to the traditional active directory with flexibility and transparency among the open-source software. Open LDAP is used to manage the directory services to handle the authentication process in network environments. Database authentication helps to verify and identify the database to store and retrieve the authentication credentials. Compared with existing models, these are all integrated with Windows applications. The authentication models provide security, flexibility, scalability, and cost-effective solutions.

Article Details

Section
Articles