Insights from Gartner IAM Summit 2025 - Identity, authorization, and the road ahead

Published by Alex Olivier on March 28, 2025
Insights from Gartner IAM Summit 2025 - Identity, authorization, and the road ahead

The 2025 Gartner Identity and Access Management (IAM) Summit in London brought the identity community face-to-face with the future. From the surge of machine identities to evolving authorization patterns and policy-based control, the event underlined a clear shift: identity and access are no longer just IT plumbing - they're strategic infrastructure.

Workload IAM: Getting machine identity under control

Machine identities - whether containers, VMs, services, or AI agents - have exploded in number and complexity. In a standout session, Gartner’s Erik Wahlstrom walked through the emerging discipline of Workload IAM, warning that many orgs are sitting on a mountain of unmanaged machine IAM debt.

The solution? A well-structured identity taxonomy that recognizes not just users, but also devices, workloads, and services as first-class identity types. This, paired with what Gartner calls an "identity fabric", creates a functional foundation for managing secrets, credentials, and access across hybrid and cloud-native environments.

For authorization vendors and platform teams alike, the takeaway is clear: machine identities need the same level of rigor and lifecycle management as human users, possibly more.

Modernizing authorization: Externalize or fall behind

Another key theme was authorization modernization. Mehmet Yaliman challenged legacy approaches that hardcode access logic into apps and services.

mehmet gartner iam.jpeg

Authorization, he emphasized, should be:

  • Centralized for consistency and auditability
  • Dynamic to adapt to risk and context
  • Externalized so policy updates don’t require code changes

The framework Gartner proposes combines admin-time controls (e.g., role provisioning) with runtime decisions (e.g., risk-aware access). It’s not either-or - it’s both, working in harmony, and the architecture we have been recommending since the inception of Cerbos.

Critically, the session called out the risks of “authorization sprawl” - a reality many engineering teams know too well. The prescription? Define standardized policy patterns for portals, APIs, services, and mesh layers. And use dedicated authorization tooling to implement them.

Policy-based authorization in practice

Building on that, Mehmet Yaliman’s follow-up session on policy-based authorization made the case for decoupling access control from code entirely. Policy becomes the bridge between strategic intent (Zero Trust, least privilege) and operational execution.

We loved the emphasis on “understanding your facts” - identifying the data needed to evaluate access decisions at runtime. It’s a call to action for engineers and architects to treat policies like first-class software artifacts: versioned, testable, and explainable.

For those evaluating tooling, Gartner compared various engines, policy languages, and authorization models across several factors such as expressiveness, usability, and ecosystem maturity. Spoiler: there’s no silver bullet. Multi-tool orchestration is inevitable.

Cerbos at the OpenID AuthZEN interop

One of the most exciting moments of the conference was the world-exclusive interop session of OpenID AuthZEN. This time, focusing on how to integrate authorization at the API Gateway layer using the specification.

Cerbos was proud to take part in this live interop event, alongside implementers like Aserto, Tyk, WSO2, Okta, Amazon Web Services, Kong, and others. This was the first public demo of API gateway use cases powered by externalized authorization policies, and it drew a queue that wrapped around the hall.

Cerbos at the OpenID AuthZEN interop.png

AuthZEN marks a huge step forward for composable authorization architectures - something we at Cerbos care deeply about. The goal is seamless integration between platforms and services, regardless of the policy engine underneath.

What it all means

The signal from Gartner this year was unambiguous: authorization is no longer just about controlling access. It’s about enabling agility, enforcing compliance, and delivering secure experiences across complex, hybrid systems.

Key takeaways:

  • Treat machine and workload identities with the same discipline as human users.
  • Externalize authorization logic. If it’s hardcoded, it’s technical debt.
  • Use policies as a shared language between developers, security, and governance.
  • Standardize your access control patterns—and test them.
  • Embrace open standards like AuthZEN to build composable, future-ready architectures.

Cerbos was built for this shift. If you're designing for runtime authorization, multi-cloud policy control, or platform-native IAM, we're here to help.

Book a free Policy Workshop to discuss your requirements and get your first policy written by the Cerbos team