In information technology, orchestration is the process of connecting and coordinating disparate tools to automate complex, multistep workflows. For example, in the realm of security orchestration, an organization might string together a secure email gateway, threat intelligence platform and antimalware software to create an automated phishing detection and response workflow.
Identity orchestration connects and coordinates the capabilities of disparate identity tools to create unified, streamlined identity workflows.
Identity tools are the tools that an organization uses to define, manage and secure user identities, such as identity verification systems and customer identity and access management platforms.
Identity workflows are the processes by which users move through identity tools. Example identity workflows include user logins, onboarding and account provisioning.
Identity tools don’t always integrate easily, especially when organizations are dealing with SaaS tools hosted on different clouds or trying to bridge gaps between on-premises and cloud-based systems. Identity orchestration platforms can connect these tools even when they aren’t built to integrate.
Identity orchestration platforms act as central control planes for all the identity systems in a network. Every identity tool integrates with the orchestration platform, creating a comprehensive identity architecture called the identity fabric.
Organizations don’t have to hardcode any of these integrations. Instead, orchestration platforms use a mix of prebuilt connectors, application programming interfaces (APIs) and common standards like SAML and OAuth to manage connections between tools.
Once identity systems are woven into an identity fabric, the organization can use the orchestration platform to coordinate their activities and control how users move between the tools during identity workflows. Crucially, the orchestration platform decouples authentication and authorization from individual apps, which makes complex identity workflows possible.
As mentioned earlier, different identity systems might not talk to each other in the absence of an orchestration solution. If, for example, an organization used a customer relationship management (CRM) tool and a document management system (DMS) from separate vendors, each app might have its own IAM system.
Users must maintain separate accounts in each app. To access either app, users would log directly into that service. Authentication and authorization would happen within each app’s distinct IAM system and would not transfer between apps.
With an orchestration solution, things are different. When a user accesses either app, the request goes through the orchestration solution first. The solution routes the request to the right identity proofing and access control service, which can be a central directory outside either app.
Once the user is authenticated and authorized by the central directory, the orchestration platform triggers the app to let the user in with the correct permissions.