Information Technology Reference
In-Depth Information
authorization and then transmitting the authorized request to the
proper resource owner. Once approved, the workf low system applies
the necessary access control list (ACL) changes and then notifies the
requestor of the new access rights assignment or denial. Obviously,
workflows can become much more complex where resource access
involves multiple data owners or when operating across organiza-
tional or authentication boundaries.
Audit reporting. Formal identity management systems include sup-
port for compliance audit, logging, and reporting. These features
may provide very flexible reporting options, or they may involve
packages tailored for the reporting requirements of specific regula-
tory statutes. Preformatted audit reporting tools can greatly simplify
legislated compliance reporting requirements by ensuring that stan-
dardized format guidelines are met.
Identity Management Providers
Many different solutions providers have created identity management
applications and suites, although most solutions implement one or more
standards for identification and authorization in order to provide enterprise
interoperability. Examples of identity management providers include:
• CA (eTrust Admin)
• Hewlett-Packard (OpenView)
• IBM (Tivoli)
• Microsoft (Microsoft Forefront Identity Manager)
• Netegrity (IdentityMinder)
• Novell (eDirectory and Nsure Identity Manager)
• Sun (Java System Identity Manager)
• Oracle (Oracle COREid)
• Quest Software (Vintela)
These solutions offer a broad mixture of features for both enterprise and
federated identity management requirements. Some solutions may be
more applicable to enterprises with an established technology base, such
as the Microsoft Forefront Identity Manager for Microsoft Active Direc-
tory solutions or Tivoli for WebSphere integrated networks. These utilities
Search WWH ::




Custom Search