Tag Archives: identity management
The Final Step in a Homegrown IDM Solution (pt. 3) – So, let’s start hammering
May 29, 2008 – 6:00 am
–
To recap briefly, we have identified and analyzed all our primary sources of user data and the system and service providers who consume those data. We have funding, developers, and a project plan to follow. We understand our provisioning process, have identified or built a directory of user…
In the Workshop (pt. 2) – Building an Identity Management Solution
May 7, 2008 – 6:00 am
–
When last in the workshop to build our own identity management system we laid the groundwork for a solution by identifying and analyzing our organization’s sourcing, staffing and human resources systems. Now that we know where our subjects originate and what attributes are available for them,…
Visit to the Workshop: A Do It Yourself Identity Management Solution (IdM)
April 24, 2008 – 6:00 am
–
One constraint to implementing third-party identity management solutions is cost. Once the moneychangers see the quote, particularly alongside the deployment timeline, the project is likely exiled to some corporate gulag of no return. Since you will need to conduct significant analysis,…
Building an Access Control Framework (pt. 1)
April 16, 2008 – 6:00 am
–
From what I have seen of Identity Management tools, they are more about management than identity, which is fine, once you have solved the the challenge of effectively identifying all the users of your sensitive data. But, slick as they can be, an IdM tool may only automate your existing processes…
Building an Access Review Compliance Framework
April 9, 2008 – 6:00 am
–
One of the major selling points for IDM vendors is that their tools will simplify your access review process. In my experience and from what I have seen offered by several of the major IDM vendors, the significant investment you would make in IDM technology, you might likely do nothing more than…