The impact of social networking sites will assume so much of importance that by the end of 2015 that 50 percent of new retail customer identities will be based on social network identities, up from less than 5 percent today, according to Gartner, Inc.
Along with federation technologies and mobile computing, social identity adoption will have a major impact on the practice of identity and access management (IAM) in 2013 and beyond.
“For an increasing number of Internet users, social networks are the Internet. Using ‘login with Facebook’ or other popular social networks reduces friction and therefore improves users' experience of customer registration and subsequent login,” said Ant Allan, research vice president at Gartner. “For registration, the required personal information can be imported from users' social profiles, reducing if not eliminating form filling. Moreover, using a social network identity means users don't have to remember rarely used passwords or endure convoluted password reset processes when they forget them.”
He added that organizations also benefit from the use of social identities for authentication. It reduces the number of abandoned registrations and logins, and makes it easier for customers to browse and buy. Therefore, it also helps organizations attract and retain customers.
However, the lack of identity proofing and weak authentication for social network identities can expose merchants to more fraud. Service providers therefore have to defend themselves. They may allow social network registration, but augment the process with additional controls when a retail site provides access to sensitive data and monetary transactions. Alternatively, merchants may accept the increased risk without additional controls because of the potential increase in the number of customers and the volume of purchases; this approach "passes the buck" to payment card companies but they already have robust fraud detection and management tools and processes in place.
“It's important for IT leaders to remember that, despite the increased risk of fraud, social network identity proofing and user authentication are no worse than the practices currently used by many businesses. In fact, social network identities could offer better identity proofing than ‘raw’ customer registration. This is because social network analysis can potentially identify bogus social identities, and some vendors can exploit the ‘wisdom of crowds’ to verify claimed social network identities,” said Allan. “There will be increased demand for specialized vendors that support this use of social network identities, as well as for support for the OAuth and OpenID Connect specifications in traditional IAM vendors' Web access management and federation products."
“However, using social network identities for authentication may not suit all organizations. Businesses offering consumer-facing services, as well as government agencies offering citizen portals, should assess the benefits of accepting social network identities for customer and citizen registration and login,” Allan said. “They must also weigh these against the risks posed by the lack of identity proofing and weak authentication for social network identities. Mitigating these additional risks may offset any cost savings.”
For Latest Updates Visit : http://www.facebook.com/pages/TelecomTiger/429104257149437 |