Google Cloud has presented Google Identity, a platform used to facilitate the management of access to user profiles, while reinforcing the security of the registry by integrating authentication tools and LDAP access protocols.
Google Identity it is oriented to software services developers (SaaS), as Google explained during the second day of the Google Next event, held in UK on October 10th and 11th, and how the company collects through a press release. This platform offers the creators of different applications functions to control the access of the users to their profiles.
One of the services it presents is customizable logon authentication, which manages user interface streams to make the record. In turn, a variety of authentication methods, from phone-message confirmation to various ‘ software ‘ and ‘ email ‘ tools.
The company reports that it is developing support for access through two-step authentication methods. The platform also integrates Google’s warning signals to find conflicting user accounts, and will provide service-level agreements and customer support.
In order to strengthen security at the logon, Cloud Identity incorporates lightweight repository access protocols (LDAP) capable of integrating access to application accounts, whether in physical installations or in the cloud, by means of a single Management tool. LDAP offers the ability to use the same credentials to log on to both traditional applications and software services.
With the union of managing these applications through a single support, Google argues that the complexity and costs are reduced, as well as the inherited identity infrastructure dependency and the security is improved. LDAP security services will arrive in the coming weeks to both Google Identity and G Suite customers.
In addition to this, Google has also announced the introduction of contextual access capabilities within Cloud Identity-Aware Proxy, a feature that allows you to manage which devices can access logon to application. This is based on ‘ context-aware ‘ access that allows you to reinforce the granular entry to cloud services based on the user’s identity and the situation in which such access is requested.