Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: identity management

The Final Step in a Homegrown IDM Solution (pt. 3) – So, let’s start hammering

– To recap briefly, we have identified and analyzed all our primary sources of user data and the system and service providers who consume those data.  We have funding, developers, and a project plan to follow.  We understand our provisioning process, have identified or built a directory of user…

In the Workshop (pt. 2) – Building an Identity Management Solution

– When last in the workshop to build our own identity management system we laid the groundwork for a solution by identifying and analyzing our organization’s sourcing, staffing and human resources systems.  Now that we know where our subjects originate and what attributes are available for them,…

Visit to the Workshop: A Do It Yourself Identity Management Solution (IdM)

– One constraint to implementing third-party identity management solutions is cost. Once the moneychangers see the quote, particularly alongside the deployment timeline, the project is likely exiled to some corporate gulag of no return. Since you will need to conduct significant analysis,…

Building an Access Control Framework (pt. 1)

– From what I have seen of Identity Management tools, they are more about management than identity, which is fine, once you have solved the the challenge of effectively identifying all the users of your sensitive data. But, slick as they can be, an IdM tool may only automate your existing processes…

Building an Access Review Compliance Framework

– One of the major selling points for IDM vendors is that their tools will simplify your access review process. In my experience and from what I have seen offered by several of the major IDM vendors, the significant investment you would make in IDM technology, you might likely do nothing more than…