
Scalability
Flexibility
Security
Working environments are becoming increasingly dynamic. This also places new demands on access and authentication security in our customers‘ IT landscapes: Systems have to be switched on and off more frequently, roles and rights have to be adjusted, new stakeholders have to be authorized, and facilities and external locations have to be released.
This is a scenario in which classic approaches cannot scale with the required efficiency and security.
A modern IAM platform opens up entirely new possibilities for authorization management that meets the requirements of a volatile working and business world as well as the customer’s high security and compliance requirements.
Task
- Development of a core system incl. connection of numerous interfaces
- Mapping and integration of various core processes
- Implementation of a graph database
- User interface for defining and updating business processes
- User interface for viewing own data, assets and process-related data
- Development of a reporting system
Solution
Micromata offers the full service for a scalable software architecture: from the selection of the right technologies and the best methodological approaches to maintenance, hosting and support.
To solve the task at hand, Micromata has developed a modern IAM for a large customer. From now on, changes in the organization can be made centrally in one place, rolled out automatically across the affected networks
and any number of systems can be switched on without loss of performance.
Architecture principle
- Modular design through microservices
- Automatic build pipeline for efficient CI/CD
- Separation of Concerns for optimal IT security
- Various distributed services per Kubernetes cluster such as
- Message queue, various databases, logging and visualization, business backend and frontend services
Set of methods
- DevOps along the entire project life cycle
- Agile project management with Scrum
- UX for an optimized user experience
Technology stack
- Workflow engine:
- Flowable: Control and modeling of business processes
- Databases:
- Neo4j: Graph database for mapping and querying an identity graph.
- Elasticstack: technical logging and business monitoring
- PostgreSQL: relational database
- Frameworks:
- React.js: implementation of various frontend applications
- Spring Boot: Backend and business logic
- Spring Cloud: Basis for microservices
- Apache Kafka: Message bus for microservice communication
- Apache Camel: import control of interfaces
- GraphQL: business data query
- Infrastructure
- AWS Cloud
- Kubernetes: container orchestration, high availability, etc.
- Docker: containerization of applications and services
- Grafana: technical monitoring
- Azure DevOps: Git, build pipelines, CI/CD
Customer benefits
With the new IAM, the customer can now keep an overview of complex structures and the network of all persons, roles and resources in the company and administer them automatically – regardless of whether they are employees, suppliers, partners, customers or service providers. It also enables them to adapt authorization and authentication for their IT systems securely, automatically and flexibly to changing requirements. Administrative and manual efforts are reduced to an absolute minimum.