{"id":23623,"date":"2024-01-13T12:24:16","date_gmt":"2024-01-13T20:24:16","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17353\/"},"modified":"2024-01-13T12:24:16","modified_gmt":"2024-01-13T20:24:16","slug":"news-17353","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17353\/","title":{"rendered":"How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions"},"content":{"rendered":"<p><strong>Credit to Author: Topher Marie| Date: Tue, 19 Dec 2023 17:00:00 +0000<\/strong><\/p>\n<p><em>This blog post is part of the Microsoft Intelligent Security Association&nbsp;<\/em><a href=\"https:\/\/aka.ms\/MISAguestblog\"><em>guest blog series<\/em><\/a><em>.&nbsp;<\/em><a href=\"https:\/\/aka.ms\/MISA\"><em>Learn more about MISA<\/em><\/a><em>.<\/em>&nbsp;<\/p>\n<p>Along with every merger and acquisition between two companies comes the need to combine and strengthen their IT infrastructure. In particular, there is an immediate and profound impact on the identity and access management (IAM) postures of both companies. With a newly combined workforce, where does all the user information live? Where are the authentications going to be handled? What changes are going to be made for authorization to applications; will users have access to the apps of the other organization? All these problems must be solved quickly in order to provide continuous day-to-day operations in a secure way.<\/p>\n<p>While most combined organizations aspire to eventually consolidate their identity systems, this is a challenging and time-consuming process. The untangling (and re-entangling) of dozens or hundreds of enterprise applications and their identity stacks takes time and deliberation. Meanwhile, there may be immense pressure from users and app owners for secure access to the appropriate apps, along with pressure from regulators and investors to unlock and demonstrate value from the combined organization. Not to mention the pressure from investors and the board to deliver immediate value after the transaction\u2019s close.<\/p>\n<p>As one of the most comprehensive and advanced IAM platforms available today, <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-id\">Microsoft Entra ID<\/a> is often the choice to be the dominant set of identity services in the combined architecture. Microsoft strives to make the merger and acquisition process as easy as possible and works with Strata Identity for a seamless integration. <a href=\"https:\/\/www.strata.io\/maverics-platform\/?utm_medium=referral&amp;utm_source=microsoft&amp;utm_content=misa+blog\" target=\"_blank\" rel=\"noreferrer noopener\">Strata\u2019s Maverics Identity Orchestration platform<\/a> does this by acting as abstraction layer to accelerate and simplify the path to consolidation.<\/p>\n<h2 class=\"wp-block-heading\">The identity challenges with mergers and acquisitions<\/h2>\n<p>Addressing IAM issues is one of the most pressing issues in a merger and acquisition scenario. Typically, other operational issues such as application workloads can continue to operate in their status quo indefinitely until such time as it makes sense to address them. The cybersecurity implications of user access, however, are immediate and need to be addressed quickly, whether this be through some sort of identity consolidation, or through a higher-level abstraction encompassing the existing systems.<\/p>\n<p>One factor that makes a migration complex is the tendency for applications to be tightly coupled with their current identity provider (IdP). When creating an application, developers and app owners may end up writing code that is very specific to their current IdP. Switching that IdP is seldom trivial, especially for long-lived applications that may have been written against a now-legacy protocol, or may have &#8220;rolled their own&#8221; authentication and authorization. Very often this calls for a complete rewrite of the application; an onerous task that is particularly daunting years or decades after its inception, when the original app team may be long gone.<\/p>\n<p>This makes the common natural approach of wholesale migration somewhat untenable, especially with the time constraints imposed by governance and regulation. Even disregarding those factors, the sheer expense of refactoring and rewriting a sizable portion of your application library\u2014anything older than about five years is probably using an outdated security profile\u2014is prohibitively expensive.<\/p>\n<p>The end goal in a merger and acquisition scenario is to quickly (and cost effectively) transition to a unified and tractable IAM posture, despite having a mix of user pools, protocols, and applications tightly coupled. Such transitions often need to happen in weeks or months, whereas a wholesale rewrite-and-migration might take years.<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters\">\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" width=\"1024\" height=\"683\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/CLO17_casualOffice_002-1-1024x683.jpg\" class=\"card-img img-object-cover\" alt=\"A woman sitting in an office working at a computer near the window.\" decoding=\"async\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/CLO17_casualOffice_002-1-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/CLO17_casualOffice_002-1-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/CLO17_casualOffice_002-1-768x512.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/CLO17_casualOffice_002-1.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Microsoft Entra ID<\/h2>\n<div class=\"mb-3\">\n<p>Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-id\" class=\"btn btn-link text-decoration-none p-0\" > \t\t\t\t\t\t\t\t<span>Learn more and try free<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\">Addressing your merger and acquisition challenges with Microsoft Entra ID and Strata Identity<\/h2>\n<p>Strata Identity takes a different approach to the challenges of managing disparate identity systems during a merger or acquisition. Instead of focusing on a migration of identities, Strata&#8217;s Maverics Identity Orchestration Platform provides an abstraction layer on top of your apps, IdPs, and services to enable you to create your own identity fabric.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/12\/Strata-diagram_Maverics-abstraction-layer-1024x612.webp\" alt=\"An icon-based diagram of an abstraction layer created by the Maverics Identity Orchestration platform during merger and acquisition activities. It shows multiple Strata orchestrators enabling a single user to access disparate identity environments and applications. \" class=\"wp-image-132821 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/12\/Strata-diagram_Maverics-abstraction-layer-1024x612.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/12\/Strata-diagram_Maverics-abstraction-layer-300x179.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/12\/Strata-diagram_Maverics-abstraction-layer-768x459.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/12\/Strata-diagram_Maverics-abstraction-layer.webp 1535w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/12\/Strata-diagram_Maverics-abstraction-layer-1024x612.webp\"><\/figure>\n<p>The Maverics Platform is composed of individual Orchestrators distributed throughout the target environment. These lightweight Orchestrators can live anywhere within the infrastructure on any operating system within Kubernetes clusters or just on standalone virtual machines. They act as a distributed mesh of control, able to pull identity information from any system\u2014whether that be through directing for authentication or just pulling additional user information for an existing session\u2014and convert identity information into the formats needed and expected by applications.<\/p>\n<p>Importantly, this approach means that existing applications do not need to be refactored or rewritten as part of the identity consolidation process. Any application that cannot be trivially swapped over to a new source of identity information\u2014and, importantly, that isn&#8217;t up-to-date on the very latest security practices\u2014is simply harnessed by Maverics. It continues to consume identity information in the way that it has always known and Maverics handles the rest. Sessions that are allowed to flow through to the application have had the Microsoft Entra identity controls applied for both authentication and authorization before the traffic is permitted to reach the application in the first place. Even app owners have their burdens reduced significantly, being needed only for some basic smoke testing during a changeover.<\/p>\n<p>This also allows for a deliberate and calculated roll out of changes to your infrastructure. No more stressful projects with hard cutover dates, with those long all-or-nothing weekend cutovers and the associated frantic testing of every application to make sure everything transitioned smoothly. Using the Maverics platform from Strata allows for measured incremental changes. Cutover a single application, at a time\u2014or even a subset of an application&#8217;s users\u2014and test with leisure.<\/p>\n<p>Better yet, if any issues are found the rollback is trivial. Since Maverics is acting as an abstraction layer over the identity process, the swapping between user stores or IdPs is handled in one simple interface. The user is unlikely to notice any impact at all as changes are made\u2014either to migrate to the new identity source or to roll back to the old configuration.<\/p>\n<p>Another benefit of this approach is that user impacting changes can be rolled out with deliberation, giving users a chance to acclimate to any new process. Let&#8217;s say, for instance, that as part of your migration you need to add <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-mfa-multi-factor-authentication\">multifactor authentication<\/a> to a body of users that didn&#8217;t use it previously. The identity abstraction layer allows you to notify your users of impending changes, and can even assist in the enrollment of the new security factors.<\/p>\n<p>This abstraction layer lets Maverics serve as the single pane of glass through which you can view the combined identity systems, securely controlling all access while, at the same time, making the incremental updates and changes to move the locus of control from these disparate systems into Microsoft Entra ID.<\/p>\n<h2 class=\"wp-block-heading\">Strata Identity: The last mile in mergers and acquisitions with Microsoft Entra ID<\/h2>\n<p>With Strata&#8217;s Maverics Orchestration Platform, mergers and acquisitions don\u2019t have to be a long, risky, and labor-intensive effort. By adding an abstraction layer over the existing identity stacks, Strata makes shifting control of authentication and authorization over to Microsoft Entra ID seamless and simple, regardless of how complex and disjointed the previous implementation might have been. Strata also prevents the nightmare of having to rewrite all your apps, using its ability to harness legacy apps with modern identity protocols to save your team immense time and effort.<\/p>\n<h2 class=\"wp-block-heading\">About Strata Identity<\/h2>\n<p>Strata Identity is a pioneer in Identity Orchestration for multicloud and hybrid cloud. The orchestration recipe-powered Maverics platform enables organizations to integrate and control incompatible identity systems with an identity fabric that does not change the user experience or require rewriting apps. By decoupling applications from identity, Maverics makes it possible to implement modern authentication, like passwordless, and enforce consistent access policies without refactoring apps.<\/p>\n<p>The Maverics platform is available on the <a href=\"https:\/\/azuremarketplace.microsoft.com\/en-us\/marketplace\/apps\/strataidentity1608323708170.maverics_transact?tab=overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Marketplace<\/a> and is an IP co-sell Benefits Eligible solution.<\/p>\n<h2 class=\"wp-block-heading\">Learn more<\/h2>\n<p>Learn more about <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-id\">Microsoft Entra ID<\/a>.<\/p>\n<p>To learn more about the Microsoft Intelligent Security Association (MISA), visit\u202four\u202f<a href=\"https:\/\/aka.ms\/MISA\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a>\u202fwhere you can learn about the MISA program, product integrations, and find MISA members. Visit the\u202f<a href=\"https:\/\/www.youtube.com\/playlist?list=PL3ZTgFEc7LyuEBQ_f-hBZXpbKHItlAd5-\" target=\"_blank\" rel=\"noreferrer noopener\">video playlist<\/a>\u202fto learn about the strength of member\u202fintegrations\u202fwith Microsoft products.\u202f\u202f&nbsp;<\/p>\n<p>To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/12\/19\/how-strata-identity-and-microsoft-entra-id-solve-identity-challenges-in-mergers-and-acquisitions\/\">How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/12\/19\/how-strata-identity-and-microsoft-entra-id-solve-identity-challenges-in-mergers-and-acquisitions\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Topher Marie| Date: Tue, 19 Dec 2023 17:00:00 +0000<\/strong><\/p>\n<p>Along with every merger and acquisition between two companies comes the need to combine and strengthen their IT infrastructure. There is an immediate and profound impact on the identity and access management postures of both companies. Learn how to protect your organization with Strata Identity and Microsoft Entra ID.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/12\/19\/how-strata-identity-and-microsoft-entra-id-solve-identity-challenges-in-mergers-and-acquisitions\/\">How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-23623","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23623"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23623\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23623"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}