ENTERPRISE AUTHENTICATION ARCHITECTURES: COMPARING KERBEROS, ACTIVE DIRECTORY, AND OKTA FOR CLOUD DATA PLATFORMS

Authors

  • Vivekananda Reddy Uppaluri USA Author

Keywords:

Enterprise Authentication, Cloud Security, Identity Management, Multi-Protocol Authentication, Zero-Trust Architecture

Abstract

The landscape of enterprise authentication architectures represents a critical frontier in modern cybersecurity, reflecting the profound transformation driven by cloud technologies and distributed computing paradigms. Organizations are navigating increasingly complex identity and access management challenges that demand sophisticated, adaptive security frameworks. The evolution from traditional perimeter-based models to advanced, context-aware authentication systems underscores the critical need for comprehensive strategies that can seamlessly integrate across diverse technological ecosystems. Modern authentication architectures must balance robust security mechanisms with flexibility, user experience, and compliance requirements, incorporating emerging technologies like artificial intelligence, machine learning, and zero-trust principles. The intricate interplay between Kerberos, Active Directory, and cloud-native solutions like OKTA demonstrates the multifaceted approach required to address contemporary security challenges, emphasizing continuous verification, granular access controls, and adaptive authentication methodologies.

 

References

Raafat Aburukba"Cloud Computing Infrastructure Security: Challenges and Solutions," 2022 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity). https://ieeexplore.ieee.org/document/9851812

Ho, P.H., Chen, H.Y., Lin, T.N., "Zero Trust Architecture of Token Network," 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom). https://ieeexplore.ieee.org/document/10271881

Kâafar, M.A., Benazzouz, L., Kamoun, F., Males, D., "A Kerberos-Based Authentication Architecture for Wireless LANs," 2004 IEEE International Conference on Networking. https://link.springer.com/chapter/10.1007/978-3-540-24693-0_117

Claudio A. Ardagna, "Certification-Based Cloud Adaptation," IEEE Transactions on Services Computing, 2021. https://ieeexplore.ieee.org/document/8259034

Okta, "Top 9 Identity & Access Management Challenges with Your Hybrid IT Environment," https://www.okta.com/resources/whitepaper/top-9-iam-challenges-with-your-hybrid-it-environment/

Info-Tech Research Group, "Cloud-Based Active Directory Services are the Way Forward for Organizations in 2023," PR Newswire, https://www.prnewswire.com/news-releases/cloud-based-active-directory-services-are-the-way-forward-for-organizations-in-2023-says-info-tech-research-group-301741157.html

Okta, "Cloud Identity and Access Management: Security Transformed," Okta White Paper, 2024, https://www.okta.com/Identity-101/cloud-identity-and-access-management/

Various Authors, "A Standardized, and Extensible Framework for Comparative Analysis of Quantitative Finance Algorithms - An Open-Source Solution, and Examples of Baseline Experiments with Discussion," 2018 IEEE International Conference on Big Knowledge (ICBK), IEEE Xplore. https://ieeexplore.ieee.org/document/8588820

Various Authors, "Zero Trust Architecture in Security," IEEE Security & Privacy, 2022, IEEE Xplore. https://www.geeksforgeeks.org/zero-trust-architecture-in-security/

Published

2025-01-16

How to Cite

Vivekananda Reddy Uppaluri. (2025). ENTERPRISE AUTHENTICATION ARCHITECTURES: COMPARING KERBEROS, ACTIVE DIRECTORY, AND OKTA FOR CLOUD DATA PLATFORMS. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY, 16(01), 210-219. https://ijcet.in/index.php/ijcet/article/view/199