When networks have no clear edge, identity becomes your control point. You verify who someone is, not where they connect from. A user accessing resources from a coffee shop gets the same scrutiny as one in the office.
Identity includes both users and devices. Your laptop has an identity. Your phone has one. Even workloads running in containers have identities. Each identity needs verification before accessing resources. This shift means your identity provider becomes your most protected asset.