Old tricks resurface: the circular evolution of software development in 2016
In the digital landscape of 2016, we are witnessing a significant evolution in several key technologies that underpin our online experiences.
Active Directory (AD) and similar directory services are set to continue their evolution, transforming into more dynamic, activity-driven identity governance systems. These systems emphasize real-time intelligence, contextual awareness, and secure, federated identity management. This evolution is particularly evident in solutions like Microsoft Entra ID and advanced Identity Governance and Administration (IGA) platforms.
Meanwhile, the concept of service-oriented architecture (SOA) is being replaced by microservices architecture. This shift is driven by the need for more scalable, agile, and cloud-native solutions. Microservices strongly rely on modern identity protocols such as OAuth 2.0 and OpenID Connect (OIDC) to enable secure, federated identity and API-level authorization across distributed services.
The conceptual evolution of PointCast/push technology, originally used for personalized push content distribution, can be seen in what's sometimes referred to as the "big reverse" or event-driven architectures. These architectures align with modern approaches where systems dynamically react to real-time events and push data or commands in a decentralized and user-centric manner, increasingly integrated with cloud-based services and federation mechanisms.
As we move forward, more companies will run microservices in a containerized environment, with the ability to automatically isolate components when they fail or need maintenance. This shift towards microservices is expected to be a significant factor in the management of large-scale applications.
However, the role consumers will play in managing their own identity in 2016 is still a larger question. Personal information brokering (PIM) could reach a peak before adoption, indicating a need for greater consumer understanding and control over their digital identities.
The website's format might change significantly in the near future, potentially as early as next year, resembling a "big reverse of the web". This shift could see a move towards a more event-driven, user-centric model, where content is delivered to users in a "push" broadcast format, based on their preferences and context.
The cloud is also expected to become more like a utility, allowing companies to charge for their services based on usage, similar to electricity or water. This shift towards a utility model will likely drive further innovation and efficiency in cloud-based services.
In conclusion, the trends we are seeing in 2016 reflect ongoing shifts in identity and access management driven by distributed workforces, SaaS adoption, and increasing cloud reliance. These trends are pushing organizations towards more intelligent, federated, and microservice-oriented architectures for security and operational agility.
[1] Microsoft Docs - Entra ID: https://docs.microsoft.com/en-us/azure/active-directory/ [2] Microsoft Docs - Identity Governance and Administration: https://docs.microsoft.com/en-us/azure/active-directory/identity/ [3] Microsoft Docs - Identity Governance and Administration Overview: https://docs.microsoft.com/en-us/azure/active-directory/governance/ [4] Microsoft Docs - Identity Governance and Administration Concepts: https://docs.microsoft.com/en-us/azure/active-directory/governance/concepts/ [5] OAuth 2.0 and OpenID Connect: https://oauth.net/2/ and https://openid.net/connect/
Technology plays a significant role in the evolution of identity governance systems, as seen in the transformation of Active Directory and the shift towards more dynamic, activity-driven identity management solutions like Microsoft Entra ID and advanced Identity Governance and Administration (IGA) platforms.
Microservices architecture, strongly relying on modern identity protocols such as OAuth 2.0 and OpenID Connect (OIDC), is replacing the traditional service-oriented architecture, emphasizing secure, federated identity management and API-level authorization.