Overview#Identity Management (IDM) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.
Identity Management is the task of controlling information about users on computers. Such information includes information that authenticates the identity of a user, and information that describes information and actions they are authorized to access and/or perform. It also includes the management of descriptive information about the user and how and by whom that information can be accessed and modified. Managed entities typically include users, hardware and network resources and even applications.
Every organization does Identity Management. Some do it by filling out forms or sending emails or making phone calls.
Usually when someone implies they are setting up Identity Management, they are applying automation to Identity Management.
Identity Management is not a product you can sell. Identity Management is a process of managing Digital Subjects.
Identity Management is much more clouded as many of the product vendors want to sell you a product. If the vendors sold you a product that did manage Digital Subjects, you would probably not be very impressed. As it is not very useful to simple add, delete and modify digital subjects within a data store. You would probably want to do something with these Digital Subjects that are in your data store.
Identity Management, by itself is not sexy and so it does not sell well.Access Control, now we have something useful. Together Identity and Access Management is what most Organizational Entities require.
More Information#There might be more information for this subject on one of the following:
- Bob Blakley
- Digital Identity
- Entitlement Management System
- Federal Identity Credential and Access Management
- Federated Identity Management
- IDM The Application Developers Dilemma
- IDM The User Dilemma
- IDM and the Organization Dilemma
- IDSA Integration Framework
- Identity Governance and Administration
- Identity and Access Management
- Logout Process
- Neo-Security Stack
- Privileged Account Management
- Sources of Authority
- Technical Positions Statements
- The Laws of Relationships
- Virtual Private Cloud
- Web Blog_blogentry_030117_1
- What Is IDM