{"id":14632,"date":"2020-11-19T09:00:16","date_gmt":"2020-11-19T08:00:16","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=14632"},"modified":"2020-11-19T11:46:14","modified_gmt":"2020-11-19T10:46:14","slug":"key-enablers-in-creating-a-seamless-and-secure-user-experience","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/","title":{"rendered":"Key Enablers in Creating a Seamless and Secure User Experience"},"content":{"rendered":"<p>With remote working and digital interactions becoming more and more common, it is essential for businesses to offer the best possible experience for day-to-day digital activities and collaboration with suppliers and partners. One way of providing a seamless and yet secure user experience is by employing and putting in place the necessary steps toward an <strong>Identity Control Tower<\/strong> model as described in this article.<\/p>\n<p>&nbsp;<\/p>\n<h2>The Workplace and its Collaboration Tools<\/h2>\n<p>It\u2019s great to be able to work from anywhere, any device and having the technology work when you need it. More than a luxury, it\u2019s a <strong>necessity<\/strong> in the current intensified remote working situation, or for international organisations with very mobile, distributed, fluid users. While so many changes happen during the crisis, your workplace should support your business reconfiguration through enabling staff, partners, suppliers to work with different applications, different teams, etc.<\/p>\n<p>The word \u201cWorkplace\u201d used in this context refers to <strong>more than the workstations and collaboration tools<\/strong>. It extends to wider areas such as enterprise architecture, application security &amp; identity and access management. Arguably, we\u2019re talking about the wider IT foundation\/digital capabilities, to support and enable business needs \u2013<strong> the workplace might just be the tip of the iceberg<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Legacy upon Legacy adds Complexity<\/h2>\n<p>On the <strong>user side<\/strong>, as soon as you go through multiple use-cases, e.g. accessing a legacy system on premise or a Software as a Service application, you are likely to require multiple accounts and therefore a cumbersome user experience.<\/p>\n<p>On the <strong>IT operation side<\/strong>, it is equally a burden to make it work: workstations are still most of the time a physical device bound to a rigid corporate domain; they need to be configured, then shipped to remote staff or external parties, and accounts still need to be provisioned in target environments, with access rights set appropriately. <strong>All the above usually being different processes which are repeated for each supplier or partner, leading to as many devices and set ups. <\/strong><\/p>\n<p>More importantly, <strong>how secure is this<\/strong> disorganised and overlapping situation? Having visibility and control on who has access to what, end to end and for all environments, is a challenge because of the siloed use-cases. And as users join and leave, applications evolve, the security level likely decreases by lack of keeping accounts and rights accurate.<\/p>\n<p>In our experience at Wavestone, all these challenges stem from the accumulation of new use-cases and technology, implemented in silo, for their own use or limited group of use-cases. The platform, which was first designed with one primary use, has now altered into a manifold use platform with an ill-fitting model and processes. Many organisations today can be proud to rely on a federated platform and modern access experience for cloud applications on one side \u2013 and a different, yet reasonably good, experience on internal applications side. However, often both are not integrated and therefore don\u2019t get the benefits we described in the introduction. We believe this comes from the lack of a truly shared model\/architecture to support a modern experience, <strong>across all use-cases<\/strong><em>.<\/em><\/p>\n<p>.<\/p>\n<figure id=\"post-14634 media-14634\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-14634 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image1.png\" alt=\"\" width=\"995\" height=\"387\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image1.png 812w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image1-437x170.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image1-71x28.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image1-768x299.png 768w\" sizes=\"auto, (max-width: 995px) 100vw, 995px\" \/><\/figure>\n<p style=\"text-align: center;\">Figure 1 &#8211; <em>Example of a corporate model in which each entity manages identities and their access separately: duplicating pro<\/em>cesses<\/p>\n<p>&nbsp;<\/p>\n<h2>One Model for a streamline experience<\/h2>\n<p>For this reason and for the future of user experience, at Wavestone we believe in a <strong>model based on Identity Control Tower<\/strong>(s).<\/p>\n<p>An Identity Control Tower is a platform to enforce your access policies. Its purpose is to <strong>verify access requests coming from trusted sources of identity and determine if that identity is allowed to access a target digital resource.<\/strong> For the metaphor, a pilot willing to get clearance for take-off will submit their flight plan using a trusted channel, and after its approval and other verification by controllers, the pilot can proceed to take-off. If we were to transpose this metaphor digitally, we would talk about a user: in order for said user to access X platform, (s)he would need to use a corporate process which itself is trusted by an Identity Control Tower. Said user would provide their \u201caccess plan\u201d (e.g. session token) to the Identity Control Tower. After the Identity Control Tower has verified the authenticity of the \u201caccess plan\u201d against its access policies it will perform other checks of context, such as: time of the request, location of origin of the access, trust level of the device etc, the user can then proceed to access the resources. Should these verifications highlight anything unusual or inconsistent in authenticating the user, additional requests can be made to allow the user in (re-authentication or step up).<\/p>\n<p>The Identity Control Tower is under your control and holds the conditions of access i.e. access policies and accepts users from specific sources thanks to a pre-established trust relationship between organisations.<\/p>\n<p>For instance, in the diagram below, imagine a situation in which a supplier is developing a new service in your cloud environment. Users from the supplier would keep their device and authentication process they use within their corporate environment, while the Identity Control Tower (ICT) would enforce access control to the cloud environment \u2013 without having to use and manage a different account and re-authenticate. For environments with very granular privileges like AWS, building a decoupled ICT is maybe not a realistic approach and the ICT is then probably the identity platform from Amazon that is managed by your organisation and linked to the identity provider of the supplier. The Identity Control Tower model is basically an extension of federation, implemented to cover all use-cases.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14636 media-14636\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14636\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image2.png\" alt=\"\" width=\"979\" height=\"383\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image2.png 874w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image2-437x171.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image2-71x28.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image2-768x301.png 768w\" sizes=\"auto, (max-width: 979px) 100vw, 979px\" \/><\/figure>\n<p style=\"text-align: center;\">Figure 2 \u2013 <em>Access of a Partner user to a Cloud Provider resource through an Identity Control Tower<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>In another scenario, as seen in this diagram, let\u2019s consider an applicant applying for a job in your organisation, thanks to a recruitment portal you offer. They would initiate an application in your portal using their government-backed digital identity, and once they provide their consent to access their LinkedIn profile, you could obtain a digital CV. For the applicant, it is as simple as showing their ID and giving a copy of their CV, rather than filling-in registration form(s) asking once again for the same standard identity information and risking a typo in their contact details \u2013 or even having to send copies of sensitive documents like their passport.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14638 media-14638\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14638\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image-3-5.png\" alt=\"\" width=\"986\" height=\"377\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image-3-5.png 842w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image-3-5-437x167.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image-3-5-71x27.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/image-3-5-768x294.png 768w\" sizes=\"auto, (max-width: 986px) 100vw, 986px\" \/><\/figure>\n<p style=\"text-align: center;\">Figure 3 &#8211; <em>An alternative scenario presenting the trust relationship between a government ID platform and the corporate<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>One Model, Three Key Pillars<\/h2>\n<p>Using our knowledge and experience, we believe that this model should be built upon three key pillars:<strong> a unique identity across all systems<\/strong>, a <strong>common<\/strong> and <strong>flexible<\/strong> model to access information and, the establishment of a <strong>360<\/strong>\u00b0<strong> trust relationship.<\/strong><\/p>\n<p><strong>A Unique Identity Architecture: this<\/strong> is achieved by following a simple rule: don\u2019t duplicate identity data. The less identity records you create for the same physical person, the more streamline the digital experience will be \u2013 as cumbersome steps start to appear when an additional account, device or authentication action is required for the user to access the target resource. The key behind a unique identity data is to <strong>try reusing the data from its (authoritative) source<\/strong> instead of duplicating\/copying it in your own systems. For instance, the suppliers or partners working with your organisation likely already have professional digital identities for their own IT use \u2013 what would be the conditions to leverage them instead of re-creating them?<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> The next two pillars contribute to answering this question.<\/p>\n<p><strong>A Common and Flexible Model:<\/strong> The second pillar is to use a common and flexible model to allow\/restrict access to information. To provide flexibility, an attribute-based access control (ABAC) model enables granular rules and is well suited to a risk-based and adaptive approach. To make it work though, it is essential to <strong>define the \u201cgrammar\u201d of the authorisation model<\/strong>: what are the actual attributes used to provide accesses that make sense at the enterprise level? How do they translate into \u201cprivileges\u201d? What are their formats\/values? When the Identity Control Tower is provided by a cloud provider (e.g. from a Cloud provider as Azure or AWS), the grammar is often determined by the said service. Furthermore, to make this model as widespread as possible across use-cases, both on the identity source side and on providing access on the target service side, we recommend implementing your platform following market standards to maximise inter-operability (SAML, OpenID Connect, OAuth, FIDO, etc.).<\/p>\n<p><strong>360\u00b0 Trust Relationship: <\/strong>Finally, the last pillar is to ensure the establishment of a 360\u00b0 Trust Relationship. In other words, <strong>perform due diligence and establish confidence thresholds<\/strong> to accept interconnection (\u201ctechnical trust\u201d) of identity platforms. The due diligence should extend to all upstream processes leading to feeding the platform with identities, for instance the HR\/procurement processes to vet identities, up to the IT on-boarding process itself \u2013 because trusting an identity platform is a first step for these identities to access your digital resources, you need to be within tolerance of the risk it comes with. This trust relationship should then be implemented through security level expectations, auditability in contractual clauses, and enforced via the supplier service management governance. With such strong requirements, one organisation must be prepared to temporarily on-board suppliers or partners within the organisation\u2019s own platform, while suppliers or partners remediate their processes and platforms to be compliant.<\/p>\n<p>&nbsp;<\/p>\n<h2>Two key success factors<\/h2>\n<p>In order to implement these three key pillars, Wavestone has identified two key success factors: being <strong>sponsored by appropriate level of management<\/strong> and <strong>building resilience and privacy by design<\/strong>. A transformation programme to establish this model would have implications and requirements in several of your organisation\u2019s departments (HR, sourcing, legal, IT, risk, security etc.), hence should be sponsored by top-management and driven with a pan-organisation approach.<br \/>\nAdditionally, as it should always be, the supporting platform should be designed and built with <strong>security<\/strong>, <strong>privacy<\/strong> and <strong>resilience<\/strong> considerations from the beginning.<\/p>\n<p>&nbsp;<\/p>\n<h3>Final Thoughts<\/h3>\n<p>As you have been able to understand throughout this article, looking at the user experience end to end and across use-cases is key to really streamline digital services. This can be achieved with a pan-organisation shift to enforce a unique identity across all systems, a common and flexible model to access information and, the establishment of a 360\u00b0 trust relationship with third parties.<\/p>\n<p>To go further in your reflection on the subject and understand the current state of your organisation, think about these questions and try to answer them: <em>picking users from different departments, what does the typical day to day digital experience look like? How long does my organisation take to on-board contractors and third parties? How does my organisation actually give access to its data and resources for external users? How many duplicate identities exist across my IT estate?<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> A technical entry might still exist within your systems, for reference purposes &#8211; but from the user perspective there is no new account, no duplicate, if they don\u2019t have to register a new login, credentials etc.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With remote working and digital interactions becoming more and more common, it is essential for businesses to offer the best possible experience for day-to-day digital activities and collaboration with suppliers and partners. One way of providing a seamless and yet&#8230;<\/p>\n","protected":false},"author":231,"featured_media":11735,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,2777],"tags":[3713,3157,3712,1750,3007,3714,3715],"coauthors":[3109,3724,3725],"class_list":["post-14632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-cybersecurity-digital-trust","tag-identity-control-tower","tag-it-en","tag-model","tag-security-en","tag-user-experience","tag-user-side","tag-workplace-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key Enablers in Creating a Seamless and Secure User Experience - RiskInsight<\/title>\n<meta name=\"description\" content=\"One way of providing a seamless and yet secure user experience is by employing and putting in place the necessary steps toward an Identity\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Enablers in Creating a Seamless and Secure User Experience - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"One way of providing a seamless and yet secure user experience is by employing and putting in place the necessary steps toward an Identity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-19T08:00:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-19T10:46:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/FOTOLI1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3873\" \/>\n\t<meta property=\"og:image:height\" content=\"3873\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Florian Pouchet, Barbara Balogun, Christophe Cumenge\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Florian Pouchet, Barbara Balogun, Christophe Cumenge\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/\"},\"author\":{\"name\":\"Florian Pouchet\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/62231bf47367ce72e4cc23758eabc5cf\"},\"headline\":\"Key Enablers in Creating a Seamless and Secure User Experience\",\"datePublished\":\"2020-11-19T08:00:16+00:00\",\"dateModified\":\"2020-11-19T10:46:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/\"},\"wordCount\":1838,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/FOTOLI1.jpg\",\"keywords\":[\"Identity Control Tower\",\"IT\",\"model\",\"security\",\"user experience\",\"user side\",\"Workplace\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/\",\"name\":\"Key Enablers in Creating a Seamless and Secure User Experience - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/FOTOLI1.jpg\",\"datePublished\":\"2020-11-19T08:00:16+00:00\",\"dateModified\":\"2020-11-19T10:46:14+00:00\",\"description\":\"One way of providing a seamless and yet secure user experience is by employing and putting in place the necessary steps toward an Identity\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/FOTOLI1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/FOTOLI1.jpg\",\"width\":3873,\"height\":3873},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key Enablers in Creating a Seamless and Secure User Experience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/62231bf47367ce72e4cc23758eabc5cf\",\"name\":\"Florian Pouchet\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/florian-pouchet\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Enablers in Creating a Seamless and Secure User Experience - RiskInsight","description":"One way of providing a seamless and yet secure user experience is by employing and putting in place the necessary steps toward an Identity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/","og_locale":"en_US","og_type":"article","og_title":"Key Enablers in Creating a Seamless and Secure User Experience - RiskInsight","og_description":"One way of providing a seamless and yet secure user experience is by employing and putting in place the necessary steps toward an Identity","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/","og_site_name":"RiskInsight","article_published_time":"2020-11-19T08:00:16+00:00","article_modified_time":"2020-11-19T10:46:14+00:00","og_image":[{"width":3873,"height":3873,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/FOTOLI1.jpg","type":"image\/jpeg"}],"author":"Florian Pouchet, Barbara Balogun, Christophe Cumenge","twitter_misc":{"Written by":"Florian Pouchet, Barbara Balogun, Christophe Cumenge","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/"},"author":{"name":"Florian Pouchet","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/62231bf47367ce72e4cc23758eabc5cf"},"headline":"Key Enablers in Creating a Seamless and Secure User Experience","datePublished":"2020-11-19T08:00:16+00:00","dateModified":"2020-11-19T10:46:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/"},"wordCount":1838,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/FOTOLI1.jpg","keywords":["Identity Control Tower","IT","model","security","user experience","user side","Workplace"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/","name":"Key Enablers in Creating a Seamless and Secure User Experience - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/FOTOLI1.jpg","datePublished":"2020-11-19T08:00:16+00:00","dateModified":"2020-11-19T10:46:14+00:00","description":"One way of providing a seamless and yet secure user experience is by employing and putting in place the necessary steps toward an Identity","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/FOTOLI1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/FOTOLI1.jpg","width":3873,"height":3873},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/11\/key-enablers-in-creating-a-seamless-and-secure-user-experience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Key Enablers in Creating a Seamless and Secure User Experience"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/62231bf47367ce72e4cc23758eabc5cf","name":"Florian Pouchet","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/florian-pouchet\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/231"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=14632"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14632\/revisions"}],"predecessor-version":[{"id":14697,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14632\/revisions\/14697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/11735"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=14632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=14632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=14632"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=14632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}