Skip to main content

Hitachi ID certification

Slide Show Presentations

View a detailed presentation about Identity Manager , or a general one about identity management.


Quote

Midsize and large enterprises looking for a logical, well-thought-out password-management and access-control product should put M-Tech on their shortlist.

-- Joanne VanAuken - Jan 1, 2006, Secure Enterprise

Product Sites

Hitachi ID Identity Manager Overview

Hitachi ID Identity Manager: Identity Management and Access Governance Hitachi ID Identity Manager is a user provisioning solution. It reduces the cost of user administration, helps new and reassigned users get to work more quickly and ensures quick and reliable access deactivation. This is accomplished with: auto-provisioning, auto-deactivation, identity synchronization, self-service profile updates, delegated administration, policy enforcement and reports. Identity Manager includes built-in connectors to manage users and entitlements on over 120 kinds of systems and applications.

Identity Manager is an integrated solution for managing identities and security entitlements across multiple systems and applications. Organizations depend on Identity Manager to ensure that users get security entitlements quickly, are always assigned entitlements appropriate to their needs and in compliance with policy and are deactivated reliably and completely when they leave the organization.

Identity Manager implements the following business processes to drive changes to users and entitlements on systems and applications:

  • Automation: grant or revoke access based on data feeds.
  • Synchronization: keep identity attributes consistent across applications.
  • Self-service: empower users to update their own profiles.
  • Delegated administration: allow business stake-holders to request changes directly.
  • Certification: invite managers and application owners to review and correct entitlements.
  • Workflow: invite business stake-holders to approve or reject requested changes.

Identity Manager strengthens security by:

  • Quickly and reliably removing access to all systems and applications when users leave an organization.
  • Finding and helping to clean up orphan and dormant accounts.
  • Assigning standardized access rights, using roles and rules, to new and transitioned users.
  • Enforcing policy regarding segregation of duties and identifying users who are already in violation.
  • Ensuring that changes to user entitlements are always authorized before they are completed.
  • Asking business stake-holders to periodically review user entitlements and either certify or remove them, as appropriate.
  • Reducing the number and scope of administrator-level accounts needed to manage user access to systems and applications.
  • Providing readily accessible audit data regarding current and historical security entitlements, including who requested and approved every change.

Identity Manager reduces the cost of managing users and security entitlements:

  • Auto-provisioning and auto-deactivation leverage data feeds from HR systems to eliminate routine, manual user setup and tear-down.
  • Self-service eliminates IT involvement in simple updates to user names, phone numbers and addresses.
  • Delegated administration moves the responsibility for requesting and approving common changes, such as for new application or folder access, to business users.
  • Identity synchronization means that corrections to user information can be made just once, on an authoritative system and are then automatically copied to other applications.
  • Built-in reports make it easier to answer audit questions, such as "who had access to this system on this date?" or "who authorized this user to have this entitlement?"

Read More:

  • Features:
    Auto-provisioning, identity synchronization, authorization workflow, RBAC, segregation of duties, reporting and more.
  • Business Case:
    Developing a business case for deploying an identity management and access governance system such as Identity Manager
  • Screen Shots:
    Snapshots of the Identity Manager web user interface.
  • Screen Recordings:
    Recordings of user interaction with Identity Manager, Access Certifier and Group Manager.
  • Concept Animations:
    Animated demonstrations illustrating user interaction with Identity Manager and data flow between components on the network.
  • Slide Decks:
    A variety of slide presentations about identity management and access governance in general and Identity Manager in particular.
page top page top