The remainder of this document is organized as follows:
Explains why, in practice, most organizations manage data about users -- who they are, how to authenticate them what they have access to -- on multiple systems.
The challenges created by the intersection of multiple business change processes and multiple account repositories.
Comparing the different initial states and IAM needs of insiders and outsiders.
An overview of the kinds of identity attributes, security entitlements and credentials that IAM automation must manage.
How different kinds of IT infrastructure and automated processes help to streamline and secure IAM data and processes.
A simple definition for what constitutes identity and access management, given the foregoing.