This document describes and justifies current user provisioning best practices in an enterprise network. It is intended to offer reasoned guidance to information technology decision makers when they set security policy and design processes to manage user identity data, such as accounts and directory objects, across multiple enterprise systems.

The document is organized as follows:

  • Background information:
    Defining enterprise identity management and identifying business drivers for and deliverables from user life-cycle management.
  • Business drivers:
    Including both hard and soft costs, security threats and regulatory compliance.
  • Human factors:
    How human behaviour affects identity management outcomes.
  • Administration processes:
    Recommended business processes for managing user identity data and user access to systems.
  • Internal controls:
    Requirements and recommendations for establishing effective internal controls over user access to systems.
  • Find out more:
    Other resources with information about password management.

Please register

Access to this document requires registration. Please fill in the form below. The full document will be emailed to you automatically.


required Full Name:


  Telephone Number:

required Work Email:

required Company:

required Total number of staff in your company:

required Country:

Please check the information you entered above before continuing.

Click to continue: