The remainder of this document is organized as follows:
The motivation for deploying Identity Manager.
How the intersection of many systems with many business processes create complexity and how implementing shared processes to manage identities and entitlements helps.
Best practices for faster, simpler and more reliable processes to manage identities and entitlements across the enterprise.
How Identity Manager discovers current state and applies changes to identities and entitlements on systems and applications, on-premises and in the cloud.
A more detailed description of Identity Manager functionality.
A view into the analytics included in Identity Manager and how they relate to the needs of IT, audit and security.
Internal product components and network architecture.
How reference implementations accelerate deployment of Identity Manager, reduce risk and lower cost.
Estimating the cost savings to users (soft cost / productivity) and to the IT organization (head count reduction) that can accrue from automating processes with Identity Manager.