Giving the right users appropriate access to technology resources is Data Security 101. For security purposes, you may want to utilize a framework of policies and technologies known as identity and access management (IAM). Join us on today’s journey and see how using a third-party provider for IAM can help make your software projects more predictably successful.
In this episode, we’re covering:
· The first steps for implementing IAM
· Stability of third-party IAM implementations
· Zero trust architecture (ZTA)
· Innovations that are making MFA easier for users
Corey Weathers graciously stops by Blue Blazes and shares insights about IAM, Okta, and more. During his chat with host J. Tower, Corey gives thoughts on when not to use an IAM solution, different UI platforms that can allow developers to take advantage of SSO services, and what you may need to give up when using a third-party IAM in exchange for its benefits.
About Today’s Blue Blazes Guest
Corey Weathers is passionate about sharing the magic of software, and he does a lot of that sharing in his role as the Americas Developer Relations Lead at Auth0 (now a division of Okta). Whether speaking at tech conferences or meetups, building apps live on Twitch, or appearing on a podcast, Corey is always thinking about how to inspire and equip other developers.
Corey has also worked in software development roles for Microsoft, Twilio, the U.S. government, and other organizations. He earned a B.S. in Systems & Computer science from Howard University and holds an MBA from the Haas School of Business at UC Berkeley. While he might be a native New Yorker at heart, Corey is proud to call Pennsylvania home with his kids.