The need for social distancing due to the COVID-19 Coronavirus is critical in stopping its spread. Many businesses have heeded that advice by allowing employees to work from home. While some companies may already have policies allowing work from home, many only support limited access for key personnel. There are several areas where your Identity and Access Management services may be impacted by this location change to your workforce.

The following seven items should be considered for your IAM infrastructure:
1. External Access Increases the Need for Federation

Many organizations rely on “being on the network” (internal) for access to many resources. While things like VPN can provide remote access to on-premise applications, cloud-based services may require extra hand-holding. Users that cannot access the VPN, leverage shared workstations, or have other limited access can use cloud-based applications to continue work functions. These workers may also not exist in your core directory and need to be authenticated against other sources. Leveraging federations protocols, like SAML, can ease moving these workers to externally hosted applications by eliminating the need to manage and remember additional ID’s and passwords.
2. Scaling Up Your MFA

Multi-Factor Authentication (or MFA) becomes more critical for external off-network users while working from home. While an ID and password may be sufficient internally, moving your workforce remote requires more sophisticated and secure authentication mechanisms. Push notifications, emails, SMS, voice or other channels can be leveraged for the additional credential. This infrastructure needs to quickly scale as more workforce needs to access applications off the network. Having thought-through MFA policies and infrastructure ensures that you are ready for this transition. MFA should be leveraged for both network access through VPN and also for access to cloud-based or externally-facing applications.
3. Authentication Policies Become Key

Being able to define authentication policies based upon risk analysis ensures that the user is challenged for appropriate credentials. A simple ID and password may be required when on-network or for low risk applications, but when the user is accessing a server or an application with sensitive information, step-up authentication is required. Using risk-based analysis, other data points can also be used to determine if an additional credential is required. Perhaps the user is accessing the application from a new network or at an unusual time, that user should be prompted for an additional means to validate that the user is correctly identified. This works well with the MFA solution identified above.
4. Flexible Authorization Services Reduce Time For Needed Access Changes

Temporary changes to application authorization policies may be required. Integrated authorization solutions or services allow for centralized changes to access policies, which limits the need to make application changes. Applications that need to allow different user constituencies or allow access from new locations may require changes to policies to allow access. For example, contingent workers may normally not require access to the HR portal and access is restricted. However, that portal becomes the mechanism to distribute information about corporate status. These workers need to be granted access which requires changing the portal authorization policies.
5. Role Management Simplifies Changes to User Privileges

Roles can be used to drive authorization decisions and support the changes identified above. These can be VPN or application access roles and can also drive decisions on provisioning user objects and role membership. Having a solution for role automation and the processes defined and documented for what changes are required allows for flexible automation of needed changes. This ensures that you can rapidly adjust to business demands. Since many roles are defined by directory groups, membership in those groups can be quickly assigned when needed and then revoked once the emergency has ended. This also ties into compliance systems and processes which supports future attestation for resource access.
6. Self-Service Saves the Day

On-boarding additional users requires both the processes and tools to be deployed that allow users to register, reset passwords, update account information, unlock accounts and provide other self-service functions. Self-service not only minimizes help desk load, but also ensures that users can active the appropriate credentials and register for access. Undertaking a large effort to distribute MFA tokens during an emergency is not an attenable solution. Self-service can then be integrated into your provisioning systems to handle assigning registered users roles, distribute meta data to applications, and to potentially host the forms used for self-service.
7. Mobile Application Support Might Be Required

A remote workforce requires access to applications that support the needed job functions to be productive. These applications may require additional protocol support for user authentication, authorization and profile information. Protocols like oAuth, OIDC, DSML and others allow for mobile applications to access these services. Modern IAM solutions provide support for these and other protocols and can be leveraged as a gateway for access to identity services. This also allows for both service and user authentication, authorization, and consent.