{"id":5927,"date":"2019-06-14T14:26:58","date_gmt":"2019-06-14T07:26:58","guid":{"rendered":"http:\/\/gcloudvn.wam.vn\/cloud-identity-quan-ly-nguoi-dung-thiet-bi-va-ung-dung-tap-trung\/"},"modified":"2023-05-15T10:56:31","modified_gmt":"2023-05-15T03:56:31","slug":"cloud-identity-quan-ly-nguoi-dung-thiet-bi-va-ung-dung-tap-trung","status":"publish","type":"post","link":"https:\/\/gcloudvn.com\/en\/kienthuc\/cloud-identity-quan-ly-nguoi-dung-thiet-bi-va-ung-dung-tap-trung\/","title":{"rendered":"Cloud Identity: Centralized User, Device, and Application Management"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In the article about <strong>Google Cloud Identity <\/strong><\/span><span style=\"font-weight: 400;\">Last time, we gave a general introduction to Google&#039;s identity recognition and device management services \u2013 including the concept and available features. Overall, Cloud Identity provides businesses with a service that helps<\/span><b> control <\/b><span style=\"font-weight: 400;\">login, access documents, applications. Thanks to this feature, it helps business managers can <\/span><b>consolidation and consolidation of control <\/b><span style=\"font-weight: 400;\">user access at a single platform. This article will help you dig deeper into the reasons and benefits of including Cloud Identity in your business applications. \u00a0\u00a0\u00a0<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cloud-identity-quan-ly-nguoi-dung-thiet-bi-va-ung-dung-tap-trung\/#1_Tai_sao_lai_co_Cloud_Identity\" >1\/ Why have Cloud Identity?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cloud-identity-quan-ly-nguoi-dung-thiet-bi-va-ung-dung-tap-trung\/#2_Loi_ich_khi_ung_dung_Cloud_Identity_trong_doanh_nghiep\" >2\/ Benefits of applying Cloud Identity in enterprises<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cloud-identity-quan-ly-nguoi-dung-thiet-bi-va-ung-dung-tap-trung\/#21_Don_gian_voi_nguoi_dung_hieu_qua_voi_nha_quan_ly\" >2.1. Simple for users, effective for managers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cloud-identity-quan-ly-nguoi-dung-thiet-bi-va-ung-dung-tap-trung\/#22_Lam_viec_tai_bat_ky_noi_dau_nhung_an_toan_du_lieu_luon_duoc_dam_bao\" >2.2. Work from anywhere but data safety is always guaranteed<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cloud-identity-quan-ly-nguoi-dung-thiet-bi-va-ung-dung-tap-trung\/#23_Cloud_Identity_la_mot_he_sinh_thai_mo_voi_cac_tieu_chuan_mo\" >2.3. Cloud Identity is an open ecosystem with open standards<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cloud-identity-quan-ly-nguoi-dung-thiet-bi-va-ung-dung-tap-trung\/#24_Dap_ung_moi_yeu_cau_cua_doanh_nghiep_chi_voi_mot_giai_phap\" >2.4. Meet all your business requirements with just one solution<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cloud-identity-quan-ly-nguoi-dung-thiet-bi-va-ung-dung-tap-trung\/#Ket_luan\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 style=\"padding-left: 40px; text-align: justify;\"><span class=\"ez-toc-section\" id=\"1_Tai_sao_lai_co_Cloud_Identity\"><\/span><span style=\"font-size: 14pt; color: #333399;\"><b>1\/ Why have Cloud Identity?<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">With today&#039;s strong development and application of information technology, businesses have been rapidly moving to the cloud computing environment, or at least a hybrid environment (combining the use of basic infrastructure). traditional and cloud infrastructure). According to reports on mobile device usage <\/span><a href=\"https:\/\/www.citrix.com\/content\/dam\/citrix\/en_us\/documents\/products-solutions\/citrix-mobile-analytics-report-february-2015.pdf\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">(Mobile <span style=\"color: #0000ff;\">Analytics<\/span> Report) by Citrix<\/span><\/a><span style=\"font-weight: 400;\">, the average user uses at least three devices and always needs quick access to work-related apps so they can do it wherever, whenever they need it. That means the challenges that enterprise IT teams face when technology is always in a state of rapid change.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Therefore, the need to control who has access to applications and data warehouses of enterprises is becoming increasingly urgent and complex. Checking inventory data with colleagues on the other side of the globe, supporting customers right at their office instead of moving to the place, checking email right on the plane\u2026 can say the applications are used. Building on the Cloud not only changes the way we work, but also changes the way businesses perceive security.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The problem is not one&#039;s own. Even the &quot;giant&quot; in the technology industry - Google - must face these challenges first. And from my experience, Google has launched Cloud Identity \u2013 not only helping<\/span><b> staff<\/b><span style=\"font-weight: 400;\"> have been <\/span><b>Simple access<\/b><span style=\"font-weight: 400;\">, security but also gives the <\/span><b>manager<\/b><span style=\"font-weight: 400;\"> business one solution <\/span><b>centralized user control.<\/b><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14326 size-full\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2019\/06\/pasted-image-0-3.png\" alt=\"Cloud Identity: Centralized User, Device, and Application Management\" width=\"1000\" height=\"518\" \/><\/p>\n<h2 style=\"padding-left: 40px; text-align: justify;\"><span class=\"ez-toc-section\" id=\"2_Loi_ich_khi_ung_dung_Cloud_Identity_trong_doanh_nghiep\"><\/span><span style=\"font-size: 14pt; color: #333399;\"><b>2\/ Benefits of applying Cloud Identity in enterprises<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"21_Don_gian_voi_nguoi_dung_hieu_qua_voi_nha_quan_ly\"><\/span><b>2.1. Simple for users, effective for managers<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Cloud Identity gives your users - employees a simple access tool, with just one click, they can access the resources they need. As a result, employees can work anytime, anywhere, on any device. This helps them focus on their work, while admins can manage the identities of visitors, associated applications or devices in use \u2013 all in one place. , whether they have just joined, moved or left the company.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Cloud Identity&#039;s Single Sign On (SSO) feature also supports SAML 2.0, OpenID, G Suite applications such as Docs, Drive, etc. and also supports external applications such as Salesforce, <\/span><span style=\"font-weight: 400;\">SAP SuccesFactors, Box,\u2026<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">For businesses that are using the resources of <a href=\"https:\/\/gcloudvn.com\/en\/google-cloud-platform\/\">Google Cloud Platform<\/a>Cloud Identity also gives admins control over both users and groups in hybrid environments.<\/span><\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"22_Lam_viec_tai_bat_ky_noi_dau_nhung_an_toan_du_lieu_luon_duoc_dam_bao\"><\/span><b>2.2. Work from anywhere but data safety is always guaranteed<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">It&#039;s not just about building information systems, connecting end users to the resources they need, whatever those resources are, where they are located - is also an essential role of the IT department. Now, the image of an employee having to be at the office every day, working with an old desktop computer has gradually been replaced by the image of them sitting at a coffee shop, co-working space, or even Even at the airport, with my phone and laptop. It is this new way of working that will be a suggestion for businesses to design their login and security management processes.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Cloud Identity brings effective and tight mobile device management, for both Android &amp; iOS devices with a lot of features such as account wiping (deleting all data in the account if found to be dangerous. security threat) or automatically set up passwords for users. Business admins can use a centralized, integrated admin page to do a variety of things: Lock screen, find device, enforce (mandatory) two-step verification, and lock security just in case fraudulently steal information, or manage the use of the Chrome browser.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Admins can also view security analysis and reports for other factors such as: abnormal logins, logins to third-party applications, websites or extensions; audit (audit) user activity. <\/span><\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"23_Cloud_Identity_la_mot_he_sinh_thai_mo_voi_cac_tieu_chuan_mo\"><\/span><b>2.3. Cloud Identity is an open ecosystem with open standards<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Enterprises choose solutions from suppliers <\/span><i><span style=\"font-weight: 400;\">Directory Service*<\/span><\/i><span style=\"font-weight: 400;\"> Traditionally, there is often no choice but to use only that provider&#039;s platform and protocol (this is also known as &quot;vendor lock-in&quot;). But this is not, and should not be, the standard that businesses choose their management solutions for. Instead, opt for an open platform from which you can leverage any solution that benefits your business. A good cloud-based identity management platform should give IT the independence they need, while ensuring centralized access management. \u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><i><span style=\"font-weight: 400;\">*Directory (or Directory service) is <\/span><\/i><i><span style=\"font-weight: 400;\">a directory service, applied in storing information and data according to the Directory organization architecture and centrally managing objects (shared applications, users, printers, ...), thereby helping to Simplify resource identification and management.<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Likewise, Google Cloud Identity is built to be an open ecosystem as Google has committed to <\/span><a href=\"https:\/\/fidoalliance.org\/about\/what-is-fido\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">open standards in the security space <span style=\"color: #0000ff;\">tell<\/span> honey<\/span><\/a><span style=\"font-weight: 400;\">. Businesses can easily integrate Cloud Identity with other traditional or cloud-based directory solutions. Currently, Google is also working with a network of many identity service providers to help businesses choose the solution that best suits them, meeting deployment requirements in a hybrid environment. \u00a0<\/span><\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"24_Dap_ung_moi_yeu_cau_cua_doanh_nghiep_chi_voi_mot_giai_phap\"><\/span><b>2.4. Meet all your business requirements with just one solution<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Cloud Identity is built to give businesses the tools they need to protect users, devices, and data from a single place, thereby not only improving work efficiency, but also reducing risk. data theft. \u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"http:\/\/www.healthchannels.com\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">HealthChannels<\/span><\/a><\/span><span style=\"font-weight: 400;\"> is a unit that has put Cloud Identity into the application and met its management requirements. Daniel Tehrani \u2013 Vice President of Information Technology at HealthChannel shared: \u201cAt HealthChannel, we help more than 15,000 healthcare workers in hospitals and clinics. This means helping train, assign tasks, and move hundreds of employees each month. Meanwhile, the team still has to ensure transparency and control over which applications they are allowed to access. Although the team is only 6 people, Cloud Identity has helped us manage employee work cycles effectively.\u201d<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Ket_luan\"><\/span><b>Conclusion<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Despite bringing a lot of practical benefits, in general, the application of Cloud Identity in Vietnamese businesses is still not popular. A big part of the reason is that we are still not fully aware of the importance and benefits of managing users and resources in the enterprise. In the current era of technology development, it is always accompanied by potential security risks, so it is never too late to centrally manage resources and apply the benefits of cloud computing. You can <\/span><a href=\"https:\/\/cloud.google.com\/identity\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Register for free use<\/span><\/a><span style=\"font-weight: 400;\"> any time, or at least learn more about them<\/span><span style=\"font-weight: 400;\">.<\/span><span style=\"font-weight: 400;\"> \u00a0<\/span><\/p>\n<p style=\"text-align: right;\"><strong>Source: <a href=\"https:\/\/gcloudvn.com\/en\/\">Gimasys<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Trong b\u00e0i vi\u1ebft v\u1ec1 Google Cloud Identity l\u1ea7n tr\u01b0\u1edbc, ch\u00fang t\u00f4i \u0111\u00e3 gi\u1edbi thi\u1ec7u chung v\u1ec1 d\u1ecbch v\u1ee5 nh\u1eadn d\u1ea1ng danh t\u00ednh v\u00e0 qu\u1ea3n l\u00fd thi\u1ebft b\u1ecb c\u1ee7a Google &#8211; bao g\u1ed3m kh\u00e1i ni\u1ec7m v\u00e0 c\u00e1c t\u00ednh n\u0103ng hi\u1ec7n c\u00f3.&hellip;<\/p>","protected":false},"author":1,"featured_media":5928,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5927","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kienthuc","entry","has-media"],"_links":{"self":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/5927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/comments?post=5927"}],"version-history":[{"count":0,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/5927\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media\/5928"}],"wp:attachment":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media?parent=5927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/categories?post=5927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/tags?post=5927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}