Information Technology Reference
In-Depth Information
services that provide credentials management, authentication, and autho-
rization. These solutions may even provide federated delivery of credentials
across a range of authentication pools. However, formal identity manage-
ment solutions also provide management and administrative support to
the infrastructure that delivers identity services, including:
Account provisioning. Identity management systems provide auto-
mated tools for creating, updating, and retiring security identifiers.
Examples of this type of functionality include application services
that access human resources data to create user log-on accounts for
new hires, update information fields based on departmental assign-
ment, and suspend or deactivate log-on accounts upon termination
or dismissal. When implemented in high-turnover environments
such as food-industry or higher-education enterprises, automated
provisioning of user accounts can provide tremendous time and
administrative cost savings over manual management methods.
Permission assignment. Identity management solutions may assign
group membership and access rights based on departmental assign-
ment or organizational role (such as an accountant or manager).
By automating permission assignment, there is less opportunity for
accidental access assignment or delayed revocation of rights follow-
ing employment separation procedures.
Password management. Identity management solutions provide
mechanisms to control password strength, re-use, and other aspects
of a credential's lifecycle. This may include automatic regeneration
and assignment of public-key infrastructure (PKI) certificates, expi-
ration of password values, and similar processes necessary to ensure
the security and viability of provided security credentials.
Self-service. Identity management solutions frequently include utili-
ties to allow users the ability to update public information associated
with their log-on identity, such as contact information and status.
Other solutions provide password reset capabilities without requir-
ing administrative assistance, or may allow a user to request access
to a protected resource without having first to identify the resource
owner (DAC environments).
Work f low. Identity management solutions may include provi-
sions for automating workflows, performing such sequential tasks
as first passing resource access requests to management for request
Search WWH ::




Custom Search