White Papers

Resources for planning, selecting, and implementing an identity management system.

arrowIdentity Management Basics
  • Defining Identity and Access Management:
    Identity and access management (IAM) systems automate business processes to manage identities, credentials and access rights across systems and applications. This document defines the functional and integration components of IAM systems..
  • Identity Management Terminology:
    This document introduces key identity management terminology and offers clear, unambiguous definitions. The intent is to help the reader focus on solving real problems, rather than waste energy on the language of identity management.
  • Beyond Roles: A Practical Approach to Enterprise User Provisioning:
    Introduces a strategy for large-scale enterprise identity and entitlement management that takes advantage of roles but is not constrained to only using roles. The strategy complements the traditional role-based approach with user-issued security requests and periodic audits.
  • Access Governance Using the Hitachi ID Identity and Access Management Suite:
    This document introduces the concept of access governance. This concept is linked to corporate business drivers around risk management and audit and explains how the Hitachi ID Identity and Access Management Suite meets access governance requirements.
  • _RefBuildCorp:
    Managing identities#&44; entitlements and credentials for employees and contractors.
  • _RefBuildBB:
    Managing identities#&44; entitlements and credentials for users associated with business partners.
arrowMobile Access and Byod
  • Secure Architecture for Mobile Device Access to On-Premise Applications:
    This document introduces a technical architecture that enables applications installed on mobile phones and similar devices to access security-sensitive applications deployed inside a private corporate network perimeter. The mobile devices may be personal (i.e., "BYOD") or corporate owned/managed, but it is assumed that they are neither wirelessly attached to the corporate network nor necessarily able to establish a virtual private network (VPN) link.
arrowIdentity Management Best Practices
arrowIAM and Cloud Computing
  • Identity Management as a Service: Deploying IAM in a SaaS Model:
    This document discusses strategies for deploying an identity and access management system (IAM) using a software as a service (SaaS) provider. It identifies business and technical challenges that arise when an IAM system is moved outside of an organization's private network perimeter and offers solutions to address them.
  • Intersection of Identity Management and Cloud Computing:
    This document is a comprehensive analysis of all the ways that Identity and Access Management (IAM) solutions can be run in and integrate with cloud computing systems. Both cloud computing and IAM are relatively new, so the first part of this document defines key concepts and terminology. Next, assumptions that clarify the scope of this document in terms of network topology and functionality are presented and finally a comprehensive list of architectural scenarios are presented, along with an analysis of the costs, risks and benefits of each scenario.
arrowHitachi ID Identity Manager Product Literature
  • Color Brochure:
    One page glossy product brochure for Identity Manager.
  • Enterprise-Scale IAM with Hitachi ID Identity Manager:
    This document introduces the business challenges of managing the lifecycle of identities and entitlements at scale: slow and complex onboarding; redundant administration effort; slow and unreliable deactivation; users with entitlements that exceed their business need and invalid or inconsistent data about users. It then describes how Hitachi ID Identity Manager addresses these problems with a combination of automated and self-service processes.
  • Hitachi ID Identity Manager Features at a Glance:
    A brief overview of Hitachi ID Identity Manager features.
  • Locking Down an Identity Manager Server:
    It is important to protect both the Hitachi ID Systems product server and the data it stores. This document describes how.
  • Selecting a User Provisioning Product:
    This document helps organizations to define criteria which can be used to select an appropriate user provisioning product. The selection process begins with the business case for a user provisioning system. This business case is used to develop functional and technical requirements, which in turn drive the product and vendor selection process.
arrowManaging an Identity Management Project
  • Building a Business Case for Identity Administration and Access Governance:
    This document is designed to assist in the preparation of a business case for the deployment of an identity administration and access governance (IAM) system. The benefits of an IAM system: namely cost savings, improved user service and strengthened security are justified in terms of concrete metrics, which compare current to desired state.
  • Best Practices for IAM Projects:
    Presents best practices for deploying and operating an identity management infrastructure. Builds on Hitachi ID Systems' years of experience in deploying password management and user provisioning into some of the largest and most complex organizations in the world.
  • Identity Management Project Roadmap:
    Identity Management Project Roadmap.
  • Addressing Deployment Challenges in Enterprise Identity Management:
    Describes the major challenges in deploying an enterprise identity and access management (IAM) system, including data cleansing, role engineering and workflow definition and maintenance. Goes on to suggest techniques and best practices to overcome every challenge.