Introduction to Identity Management

Page 1

1

Introduction to Identity Management

Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

An overview of business drivers and technology solutions.

2

Identity and Access Needs are Ever-Changing Digital identities require constant administration to reflect business changes: • Who? (Types of users): Employees, contractors, vendors, partners, customers. • Why? (Business events): Hire, move, change job function, terminate. • What? (Change types:) Create/move/disable/delete user, update identity data and entitlements, reset passwords. • Where? (Applications:) AD, Exchange, Notes, ERP, Linux/Unix, database, mainframe, physical assets.

Complexity creates delay and reliability problems: • Productivity: Slow onboarding, change fulfillment. • Cost: Many FTEs needed to implement security changes. • Security: Unreliable access termination, inappropriate user entitlements. Enforce SoD policies. • Accountability: Who has access to what? How/when did they get it?

© 2012 Hitachi ID Systems, Inc.. All rights reserved.

1


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.