IAM

Core Identity & Access Management Use Cases

Here is a reference list of common Identity & Access Management Use Cases: Create User Initial Population of Users in ID Store (Data seeding for existing users) New Employee through automated HR feed New Non-Employee – Internal (HR feed, workflow request, application of record) New Non-Employee – External (workflow request, application of record)  New Employee …

Core Identity & Access Management Use Cases Read More »

How Identity Management Cuts Costs

Identity & Access Management (IAM) solutions aren’t new. Most large organizations have implemented some form of IAM and realized dramatic savings in managing the user lifecycle from the user’s creation to separation. The real driver goes beyond cost because end user productivity and security are greatly enhanced as well. Yet a number of organizations are still …

How Identity Management Cuts Costs Read More »

Part 2: Defining Roles for IAM – From the Bottom Up

We believe that a two-pronged approach to roles definition is the key to implementing Role Based Access Control (RBAC) successfully. While there are tools that can automate the ‘bottom up’ approach, the old adage “Garbage In, Garbage Out” applies. If the data that you are basing your role definition on are bad, then a bottom …

Part 2: Defining Roles for IAM – From the Bottom Up Read More »

Roles Definition- Part I

Defining Roles: The Top-Down Process in Practice

Our path to well-defined roles begins with the system owner who evaluates the applications and which users should have access. When he determines that a group does not belong, for example, the accounting folks should not be on a particular application or system, he removes them…All of them. This first pass eliminates users who should …

Defining Roles: The Top-Down Process in Practice Read More »

Roles Definition- Part I

Part 1: Defining Roles for IAM – Begin at the Top!

Implementing roles-based access control is invaluable, when implemented correctly.  Roles simplify access management for employees, contractors, and external users by incorporating the business policies and rules necessary to grant appropriate access; allowing the Identity Management solution to grant, modify and revoke access automatically. Just as importantly, roles simplify compliance as well, making it easier to …

Part 1: Defining Roles for IAM – Begin at the Top! Read More »

Part IV –Good Data Quality drives better Identity Management

Most organizations spend many months defining requirements and determining which Identity Management (IDM) solution will help them improve their business, while few pay attention to the data that are critical to running their IDM systems. If your organization is going to invest large sums of money and time building an IDM solution, why is data …

Part IV –Good Data Quality drives better Identity Management Read More »

Part III- Four Strategies to Assess Data Quality for Identity Management

Identity Management (IDM) systems rely on accurate user data in order to manage user access, enforce policies, and support network security. Historically, organizations have not had a good grasp on the required data profile of their user populations, including employees, contractors, partners, and vendors. In fact, many organizations know very little about their contractor populations …

Part III- Four Strategies to Assess Data Quality for Identity Management Read More »

Part II – The 5 Dimensions of Data Quality

Data quality is a term that refers to the reliability and validity of user-level data collected in the Authoritative Systems that feed your Identity and Access Management system (IAM). Quality is measured by how accurately the user data in the system reflects actual information available in the real world. In Part I of this series, we …

Part II – The 5 Dimensions of Data Quality Read More »

Part I – Data Quality is the lifeblood of Identity Management (IAM)

At most large enterprises, the IT environment has evolved over decades into an “accidental architecture” with everything from mainframes, PCs, and LANs to the Internet, cloud, and mobile devices, all connected by a poorly tied together patchwork that limits speed, flexibility, and innovation. IAM offers a new model for managing users and devices within the …

Part I – Data Quality is the lifeblood of Identity Management (IAM) Read More »

Scroll to Top