Organizations rely on identity and access management (IAM) systems
to streamline the administration of identities, entitlements and
credentials and to enforce controls over access to critical systems,
applications and data.
This document is an introduction to modern IAM systems, to help
organizations plan for, prioritize, deploy and manage IAM process
automation. It covers:
-- reasons to deploy an IAM system.
Process optimization and automation
-- the kinds of processes that can be automated and
advice regarding best practices rather than
automating existing processes.
Data cleanup versus process automation
-- clarifying that cleaning up identity and entitlement
data or defining roles are not pre-requisite to
IAM process automation.
Architecture and integrations
-- the integrations between the IAM
system and other systems and applications and
the variables that should be considered to scale
the system up.
-- staffing required to deploy and operate an IAM
Selecting a vendor and product
-- advice for how to select a suitable product
from a helpful vendor without having to read
thousands of pages of RFP responses.
Program, not project management
-- a long-term commitment to
implement and expand the system.
-- prioritizing deliverables and expanding the
scope of the often, rather than trying to
implement all possible processes and integrations
Ongoing system management
-- roles and responsibilities for the IAM program
team once the system has been deployed.