Identity Management you can trust

Staying secure in an increasingly complex cyber society

IoT identity management

As our world becomes more connected, it also becomes more complex. Especially when it comes to identity and access management (IAM). This is a challenge that impacts us all, from the individuals accessing services to the enterprises and operators whose role is to authenticate and authorize individuals and devices accessing the internet every day.

At Ericsson, we build the world's largest systems for trustworthy user authentication, authorization, data integrity and consent management in mobile networks. In fact we're so trusted, that our products and services for digital IAM systems are used by market-leading operators and enterprises the world over.

As service providers explore new revenue streams and invest in security, they want reassurance around service-related transactions.

With the Internet of Things (IoT) and a rapid increase in connected devices, the lack of proper IAM is a major concern. It leaves devices open to identity theft, encryption and unauthorized parties taking control of smart devices like medical equipment. This is further driving demand for the quick implementation of effective, fast IoT digital identity and security solutions.

Identifying users and things

Mobility is the key to new services and enabling new revenue streams. That means digital identity solutions across mobile, federated or IAM cloudbased platforms are crucial for individuals and services. Why? Because they counter-act the growing issue of identity exposure and unexpected digital threats. When it comes to personalized services, issues of identity validation, consent, attribute sharing, and trust management really matter. This need for resilient, advanced IAM spans across IoT devices, individuals and services, from internet banking to smart metering. Some may need more security than others: internet banking, for example, will need the highest security multi-factor authentication (MFA), consent and authorization. With many IoT devices' service life spanning decades, having the right mix of algorithms and key sizes for the authentication, authorization and encryption protocols is a must.

Identifying mobile users

Implementing security for identities from the start

When it comes to launching a new service or introducing an entire fleet of connected IoT devices (such as smart meters) the challenge is the same: ensuring security is tight from the very beginning. Success lies in creating future-proof, secure IAM solutions that, in turn, become business solutions.
Ericsson have a leading position in digital identity, IAM, cloud and now analytics and security management products. By bringing these together in our ground-breaking digital identity management solutions, we can prevent breaches of security.
It starts with the right building blocks. Technologies such as PKI, GBA, Blockchain, OAuth, OpenId Connect and e-SIM management offer the foundations for a complete, user-friendly, automated and secure authentication and authorization solution.

Ericsson identity management solutions provide a unique value proposition for any operator and large enterprise, seamlessly managing the identity of billions of devices and individuals. With a portfolio of world-leading security solutions such as Authentication Federation Gateway (AFG), Device Security Enabler (DSE) and Identity & Access Management (IAM), Ericsson cover virtually all identity and access management needs of current internet of people and future IoT deployments. Additional services for fraud detection and cross-technology integration capabilities can also be implemented using Ericsson Security Manager.

Cross-domain identity of things

The rapid expansion of the Internet of Things (IoT) calls for a clearer common understanding of how identities function in the digital world. With IoT made up of an endless number of domains, the next challenge is how to manage the single and overlapping identities that come from them. The key? Being able to manage these multiple identities across different domains efficiently by employing the cross-domain identity management solution that best meets its specific requirements.

Read more
Cross-domain identity of things

Want to find out more?

For more information on Ericsson identity management solutions, please get in touch.

Contact us