Previous PDF

swipe to navigate


The remainder of this document is organized as follows:

  • Multiple account repositories:

    Explains why, in practice, most organizations manage data about users -- who they are, how to authenticate them what they have access to -- on multiple systems.

  • Managing identities and entitlements across applications:

    The challenges created by the intersection of multiple business change processes and multiple account repositories.

  • User communities:

    Comparing the different initial states and IAM needs of insiders and outsiders.

  • Data that must be managed:

    An overview of the kinds of identity attributes, security entitlements and credentials that IAM automation must manage.

  • IAM components:

    How different kinds of IT infrastructure and automated processes help to streamline and secure IAM data and processes.

  • Identity and access management defined:

    A simple definition for what constitutes identity and access management, given the foregoing.

Previous PDF

Comment via LinkedIn