- Defining Identity Management:
Defines the components of identity
management, starting with the underlying business challenges of
managing user identities and entitlements across multiple systems
and applications. Identity management functions are defined in
the context of these challenges.
- Identity Management Terminology:
This document introduces key identity management terminology and offers
clear, unambiguous definitions. The intent is to help the reader focus
on solving real problems, rather than waste energy on the language of
- Beyond Roles: A Practical Approach to Enterprise User Provisioning:
Introduces a strategy for large-scale enterprise
identity and entitlement management that takes advantage
of roles but is not constrained to only using roles.
The strategy complements the traditional
role-based approach with user-issued security requests and
- Identity Management as a Service: Deploying IAM in a SaaS Model:
This document discusses strategies for deploying an identity
and access management system (IAM) using a software as a service
(SaaS) provider. It identifies business and technical challenges
that arise when an IAM system is moved outside of an organization's
private network perimeter and offers solutions to address them.
- Intersection of identity management and cloud computing:
This document is a comprehensive analysis of all the ways that Identity and Access Management (IAM)
solutions can be run in and integrate with cloud computing systems.
Both cloud computing and IAM are relatively new, so the first part of this document defines key concepts
and terminology. Next, assumptions that clarify the scope of this document in terms of network topology
and functionality are presented and finally a comprehensive list of architectural scenarios are presented,
along with an analysis of the costs, risks and benefits of each scenario.
- Business Case for Identity Administration and Access Governance:
This document is designed to assist in the preparation of a business
case for the deployment of an identity administration and access
governance (IAM) system. The benefits of an IAM system: namely cost
savings, improved user service and strengthened security are justified
in terms of concrete metrics, which compare current to desired state.
- Best Practices for Identity Management Projects:
Presents best practices for deploying and operating an identity
management infrastructure. Builds on Hitachi ID Systems' years of experience
in deploying password management and user provisioning into some of
the largest and most complex organizations in the world.
- Identity Management Project Roadmap:
Identity Management Project Roadmap
- Addressing Deployment Challenges in Enterprise Identity Management:
Describes the major challenges in deploying an enterprise identity
and access management (IAM) system, including data cleansing, role
engineering and workflow definition and maintenance. Goes on to
suggest techniques and best practices to overcome every challenge.