Skip to main content

White Papers

arrowIdentity Management Basics
  • Defining Identity Management:
    Defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
  • Identity Management Terminology:
    This document introduces key identity management terminology and offers clear, unambiguous definitions. The intent is to help the reader focus on solving real problems, rather than waste energy on the language of identity management.
  • Beyond Roles: A Practical Approach to Enterprise User Provisioning:
    Introduces a strategy for large-scale enterprise identity and entitlement management that takes advantage of roles but is not constrained to only using roles. The strategy complements the traditional role-based approach with user-issued security requests and periodic audits.
  • Access Governance Using the Hitachi ID Identity and Access Management Suite:
    This document introduces the concept of access governance. This concept is linked to corporate business drivers around risk management and audit and explains how the Hitachi ID Identity and Access Management Suite meets access governance requirements.
arrowMobile Access and Byod
  • Secure Architecture for Mobile Device Access to On-Premise Applications:
    This document introduces a technical architecture that enables applications installed on mobile phones and similar devices to access security-sensitive applications deployed inside a private corporate network perimeter. The mobile devices may be personal (i.e., "BYOD") or corporate owned/managed, but it is assumed that they are neither wirelessly attached to the corporate network nor necessarily able to establish a virtual private network (VPN) link.
arrowIdentity Management Best Practices
arrowIAM and Cloud Computing
  • Identity Management as a Service: Deploying IAM in a SaaS Model:
    This document discusses strategies for deploying an identity and access management system (IAM) using a software as a service (SaaS) provider. It identifies business and technical challenges that arise when an IAM system is moved outside of an organization's private network perimeter and offers solutions to address them.
  • Intersection of Identity Management and Cloud Computing:
    This document is a comprehensive analysis of all the ways that Identity and Access Management (IAM) solutions can be run in and integrate with cloud computing systems. Both cloud computing and IAM are relatively new, so the first part of this document defines key concepts and terminology. Next, assumptions that clarify the scope of this document in terms of network topology and functionality are presented and finally a comprehensive list of architectural scenarios are presented, along with an analysis of the costs, risks and benefits of each scenario.
arrowHitachi ID Identity Manager Product Literature
arrowManaging an Identity Management Project
  • Business Case for Identity Administration and Access Governance:
    This document is designed to assist in the preparation of a business case for the deployment of an identity administration and access governance (IAM) system. The benefits of an IAM system: namely cost savings, improved user service and strengthened security are justified in terms of concrete metrics, which compare current to desired state.
  • Best Practices for Identity Management Projects:
    Presents best practices for deploying and operating an identity management infrastructure. Builds on Hitachi ID Systems' years of experience in deploying password management and user provisioning into some of the largest and most complex organizations in the world.
  • Identity Management Project Roadmap:
    Identity Management Project Roadmap
  • Addressing Deployment Challenges in Enterprise Identity Management:
    Describes the major challenges in deploying an enterprise identity and access management (IAM) system, including data cleansing, role engineering and workflow definition and maintenance. Goes on to suggest techniques and best practices to overcome every challenge.
arrowSpecial cases and advanced topics
page top page top