Hitachi ID Identity Manager Integrations

This page describes how Hitachi ID Identity Manager integrates with existing enterprise IT infrastructure

Hitachi ID Identity Manager has an open architecture and can be integrated with the full spectrum of existing IT infrastructure:

  • Extensive set of connectors

    Identity Manager has built-in support for many types of systems, directories and applications. It can also be readily integrated with custom and vertical market applications, with little or no custom programming.

    Built-in support for every relevant platform expedites deployment, as roll-out is not held up waiting for product enhancements or custom software development.

  • E-mail integration

    Over 300 events can trigger e-mails to users, administrators, the help desk and more. This includes invitations to enroll, to approve requests and "thank you" e-mails. The same events can also trigger automatic creation or tickets in a problem management system.

    E-mail integration is primarily used to invite users to act and notify users of events that pertain to their profile or their authority.

  • Help desk / incident management integration

    Every logged event can trigger "external systems notification." Binary integration programs are provided to propagate event data to any of over 20 types of help desk applications:

    Please refer to [link] for a list of supported/integrated incident management applications.

    Additionally, Identity Manager can integrate with various other incident management applications through an ODBC connection, by filling in web forms, by posting messages to web services or by sending messages to a incident management system's e-mail gateway.

    Separately, a request management management system may call into a Identity Manager web service to submit access requests, such as creating a new user, granting or revoking access, scheduling or triggering immediate deactivation, performing updates to attributes like name, location or department and much more. Identity Manager exposes an open, well documented SOAP/HTTPS web service for scenarios such as these.

  • Authentication tokens, smart cards, PKI

    Identity Manager can authenticate users (requester, authorizers, security administrators) using hardware tokens, smart cards or software PKI certificates. Identity Manager can also provision user objects and provision physical devices on these platforms.

Read More:

  • Network architecture:
    Identity Manager network architecture.
  • Replicated, High Performance Database Architecture:
    Identity Manager includes built-in data replication and uses stored procedures to ensure optimized transaction processing.
  • Included Connectors:
    Connectors included in Identity Manager and their capabilities.
  • Auto-Discovery System:
    How the Identity Manager automatically discovers new, deleted and changed users on integrated systems and applications.
  • Reconciling User IDs:
    How Identity Manager maps user IDs on different systems back to their human users, both automatically and with human assistance.
  • Integrations:
    Integrations between Identity Manager and other parts of an IT infrastructure.
  • Custom Business Logic:
    How organizations can implement their own business logic without modifying the core Identity Manager product or impairing system reliability or upgradeability.
  • Dynamic Workflow:
    How Identity Manager invites business users to review and approve changes to user profiles.
  • Reliable Authorization:
    Using parallel invitations, reminders, escalation and delegation to get reliable results from human authorizers.
  • Roles & Rules:
    Using roles and rules to simplify the management of user provisioning policies.
  • Self-service Group Management:
    Using the included Group Manager module to move AD group management to a self-service model.
  • Event Notification:
    Identity Manager can alert people and other systems of changes that it detects on target systems and of events that took place within identity management and access governance business processes.
  • Server Requirements:
    How to configure Identity Manager servers and how many are required.
  • Customizable User Interface:
    How the Identity Manager user interface can be branded, rearranged and adapted to specific customer requirements.
  • Language Support:
    Languages in which Identity Manager can display its user interface.