Identity Management Basics
- Defining Identity and Access Management:
Identity and access management (IAM) systems automate
business processes to manage identities, credentials and access
rights across systems and applications. This document defines
the functional and integration components of IAM systems..
- Identity Management Terminology:
This document introduces key identity management terminology and offers
clear, unambiguous definitions. The intent is to help the reader focus
on solving real problems, rather than waste energy on the language of
- Beyond Roles: A Practical Approach to Enterprise User Provisioning:
Introduces a strategy for large-scale enterprise
identity and entitlement management that takes advantage
of roles but is not constrained to only using roles.
The strategy complements the traditional
role-based approach with user-issued security requests and
- Access Governance Using the Hitachi ID Identity and Access Management Suite:
This document introduces the concept of access governance. This concept is
linked to corporate business drivers around risk management and audit and
explains how the Hitachi ID Identity and Access Management Suite meets access governance requirements.
Mobile Access and Byod
- Secure Architecture for Mobile Device Access to On-Premise Applications:
This document introduces a technical architecture that enables applications installed
on mobile phones and similar devices to access security-sensitive applications deployed
inside a private corporate network perimeter. The mobile devices may be personal
(i.e., "BYOD") or corporate owned/managed, but it is assumed that they are neither
wirelessly attached to the corporate network nor necessarily able to establish a
virtual private network (VPN) link.
Identity Management Best Practices
IAM and Cloud Computing
- Identity Management as a Service: Deploying IAM in a SaaS Model:
This document discusses strategies for deploying an identity
and access management system (IAM) using a software as a service
(SaaS) provider. It identifies business and technical challenges
that arise when an IAM system is moved outside of an organization's
private network perimeter and offers solutions to address them.
- Intersection of Identity Management and Cloud Computing:
This document is a comprehensive analysis of all the ways that Identity and Access Management (IAM)
solutions can be run in and integrate with cloud computing systems.
Both cloud computing and IAM are relatively new, so the first part of this document defines key concepts
and terminology. Next, assumptions that clarify the scope of this document in terms of network topology
and functionality are presented and finally a comprehensive list of architectural scenarios are presented,
along with an analysis of the costs, risks and benefits of each scenario.
Hitachi ID Identity Manager Product Literature
- Color Brochure:
One page glossy product brochure for Identity Manager.
- Enterprise-Scale IAM with Hitachi ID Identity Manager:
This document introduces the business challenges of managing the
lifecycle of identities and entitlements at scale: slow and complex
onboarding; redundant administration effort; slow and unreliable
deactivation; users with entitlements that exceed their business need
and invalid or inconsistent data about users. It then describes how
Hitachi ID Identity Manager addresses these problems with a combination
of automated and self-service processes.
- Hitachi ID Identity Manager Features at a Glance:
A brief overview of Hitachi ID Identity Manager features.
- Locking Down an Identity Manager Server:
It is important to protect both the Hitachi ID Systems product server and the
data it stores. This document describes how.
- Selecting a User Provisioning Product:
This document helps organizations to define criteria which
can be used to select an appropriate user provisioning product.
The selection process begins with the business case for a user
provisioning system. This business case is used to develop functional
and technical requirements, which in turn drive the product and vendor
Managing an Identity Management Project
- Building a Business Case for Identity Administration and Access Governance:
This document is designed to assist in the preparation of a business
case for the deployment of an identity administration and access
governance (IAM) system. The benefits of an IAM system: namely cost
savings, improved user service and strengthened security are justified
in terms of concrete metrics, which compare current to desired state.
- Best Practices for IAM Projects:
Presents best practices for deploying and operating an identity
management infrastructure. Builds on Hitachi ID Systems' years of experience
in deploying password management and user provisioning into some of
the largest and most complex organizations in the world.
- Identity Management Project Roadmap:
Identity Management Project Roadmap.
- Addressing Deployment Challenges in Enterprise Identity Management:
Describes the major challenges in deploying an enterprise identity
and access management (IAM) system, including data cleansing, role
engineering and workflow definition and maintenance. Goes on to
suggest techniques and best practices to overcome every challenge.