Identity Management Pattern
Click any control badge to view its details. Download SVG
Key Control Areas
- Identity Lifecycle Management: The core challenge of identity management is ensuring that identities are created, maintained, and retired in a controlled and timely manner. Provisioning should be automated through integration with authoritative sources (HR systems for employees, CRM for customers, partner portals for B2B). Joiner-mover-leaver processes must be well-defined: when an employee changes role, their access entitlements must be updated to reflect new responsibilities and old access must be revoked. When an employee leaves, all access must be terminated within a defined SLA -- orphaned accounts with active credentials are a perennial audit finding and a real attack vector. Self-service capabilities (password reset, profile management, access requests) reduce operational burden while maintaining security through appropriate verification steps.
- Authentication Architecture: Authentication is the process of verifying that a claimed identity is genuine. The architecture must support multiple authentication methods appropriate to different risk levels: knowledge factors (passwords, PINs), possession factors (hardware tokens, mobile authenticators, smart cards), and inherence factors (biometrics). Multi-factor authentication combining two or more factor types should be the baseline for any access to sensitive systems. Passwordless authentication using FIDO2/WebAuthn is emerging as the preferred approach, eliminating the credential phishing and stuffing attacks that dominate current breach statistics. The authentication architecture must also address session management, token issuance and validation, and single sign-on across the application estate.
- Federation and Cross-Boundary Trust: Federation enables an organisation to accept identity assertions from external identity providers, avoiding the need to manage credentials for external users directly. The architecture must define trust policies: which identity providers are trusted, at what assurance levels, and for which relying parties. Attribute mapping and transformation at federation boundaries ensure that identity attributes are correctly interpreted across different naming conventions and schema. Just-in-time provisioning creates local accounts from federated assertions, reducing administrative overhead while maintaining local access control. Federation also enables the organisation to act as an identity provider for its own users accessing external services, centralising authentication and enabling consistent MFA enforcement.
- Authorisation and Entitlement Management: While authentication establishes who someone is, authorisation determines what they can do. The identity management architecture must integrate with authorisation systems that enforce access policies. Role-based access control (RBAC) assigns permissions based on organisational roles, while attribute-based access control (ABAC) evaluates dynamic attributes (time, location, risk score) for fine-grained decisions. Entitlement management involves the governance of who has what access, regular certification campaigns to validate access remains appropriate, and separation of duties enforcement to prevent toxic combinations of permissions. Access governance tooling should provide visibility into the full entitlement landscape across all connected systems.
- Credential and Secrets Management: Every identity has associated credentials that must be managed securely throughout their lifecycle. For human identities, this includes passwords (with complexity and rotation policies), MFA tokens, certificates, and biometric templates. For machine identities, this includes API keys, service account passwords, TLS certificates, and signing keys. Credentials must be stored using strong cryptographic protections (bcrypt, scrypt, or Argon2 for passwords; HSMs or dedicated secrets managers for keys). Rotation must be automated where possible, and credential compromise must trigger immediate revocation and re-issuance. The architecture should enforce a policy of no shared accounts, no hard-coded credentials, and no credentials in source code.
- Privacy and Data Protection: Identity systems are inherently privacy-sensitive. The architecture must implement data minimisation (collect only what is needed), purpose limitation (use identity data only for stated purposes), and storage limitation (retain identity data only as long as necessary). Privacy by design requires that consent is obtained before collecting identity data, that users have visibility into what data is held about them, and that erasure mechanisms exist for regulatory compliance (GDPR Article 17, CCPA). Audit trails of identity data access and modification provide accountability. Pseudonymisation and anonymisation techniques should be applied where full identity resolution is not required.
When to Use
This pattern applies to any organisation that stores, processes, or transmits identity information for employees, customers, business partners, or other entities. It is essential when the organisation operates multiple applications requiring authentication, when business processes cross organisational boundaries requiring identity federation, when regulatory requirements mandate specific identity data handling practices, or when the organisation is adopting cloud services that require identity integration. The pattern is also indicated when audit findings identify issues with orphaned accounts, excessive privileges, weak authentication, or lack of access governance.
When NOT to Use
Organisations that do not process personal or confidential identity information and do not store identity data may not require the full scope of this pattern. Very small organisations with a handful of users and a single application may find the full architectural approach disproportionate to their needs, though the principles of credential management and access governance remain relevant at any scale. This pattern focuses on architecture and governance rather than specific technical implementation -- it should be complemented by the appropriate infrastructure patterns (SP-008 for web authentication, SP-011 for cloud IAM, SP-014 for awareness training) for implementation guidance.
Typical Challenges
The oldest enterprise challenge in identity management is synchronisation of identity data between distributed systems. Directory services, HR systems, application databases, cloud identity providers, and partner directories all maintain identity records that must remain consistent. In outsourced and federated scenarios, this challenge extends across network and trust boundaries. Federation requires trust models that span organisations, attribute harmonisation at federation boundaries, and standards compliance from all parties -- each of which introduces friction. Timely provisioning and de-provisioning is a persistent operational challenge: the time between an employee starting work and having all required access (and conversely, the time between departure and full access revocation) directly impacts both productivity and security. Data leakage of identity information is a critical risk in every organisation. Privilege creep -- the gradual accumulation of access rights as personnel move between roles without having old access revoked -- creates excessive entitlements that violate least privilege. The proliferation of machine identities (service accounts, API keys, certificates) often exceeds human identity counts by orders of magnitude and receives far less governance attention.
Threat Resistance
This pattern addresses threats across the identity lifecycle. Credential theft through phishing, keylogging, and database breaches is mitigated by multi-factor authentication, passwordless approaches, and strong credential storage. Account takeover through credential stuffing is resisted by breach detection integration and adaptive authentication. Insider threats from excessive privileges are constrained by entitlement governance, access certification, and separation of duties enforcement. Orphaned account exploitation is prevented by automated de-provisioning tied to authoritative source events. Identity fraud in self-registration scenarios is addressed by identity proofing and verification processes. Federation-based attacks (assertion manipulation, replay, confused deputy) are mitigated by protocol-level protections in SAML and OIDC implementations. Privacy violations from excessive identity data collection or retention are addressed by data minimisation and lifecycle management controls. Machine identity compromise (stolen API keys, expired certificates causing outages) is mitigated by secrets management and automated rotation.
Assumptions
The organisation has an authoritative source of identity data (typically an HR system for employees and a CRM or registration system for customers). A directory service or identity provider exists as the central point of authentication. Network connectivity supports the authentication protocols in use (SAML, OIDC, LDAP, Kerberos). The organisation has defined data classification and risk assessment frameworks that can inform authentication assurance level requirements. Regulatory requirements for identity data handling (GDPR, CCPA, sector-specific rules) have been identified.