Category: Domains
Non-product IAM domains
-
IGA and PAM – Managing Identities in a Red Hat OpenShift Environment
You might have missed it as there wasn’t a lot of press, but IBM recently acquired a small startup called Red Hat. As with many IBMers, I have been on a steep learning curve to understand the capabilities this brings. As an interesting exercise, I thought I’d treat the OpenShift stack as an identity project…
-
SCIM Will Solve All Your IGA Problems, Right?
Continuing my theme of exploring IGA topics and “the Cloud”, I thought it worthwhile looking at SCIM and its adoption since it appeared eight years ago. The System for Cross-domain Identity Management, or SCIM, is the current rockstar of Identity Governance and Administration (IGA). It’s a lightweight data model utilizing JSON and REST that seems to solve…
-
IGA Cloud or On-Prem – Have You Checked the Plumbing?
A major decision for all software deployments, including Identity Governance and Administration (IGA) deployments, is what platform to deploy to; cloud, on-premise or a hybrid of the two. Many IGA products are available as both cloud-based and on-prem. Some on-prem products can be hosted as SaaS or managed service offerings in the cloud. Some of…
-
How Much Workflow Do You Need for Your IGA Project?
Workflow is a core capability in any Identity Governance and Administration (IGA) deployment; IGA is all about automating the business processes around managing and governing users and their access. IGA deployments often take much longer than anticipated and don’t achieve all of what the project set out to do. Why? There are many factors, but…
-
Risk-based Access Approval with IBMs IGA Products
Identity Governance and Administration (IGA) solutions are all about reducing the risk to businesses that users and their access represent. But they also need to maintain an ease-of-use so that users don’t find ways to circumvent IGA controls and introduce more risk. With IGA tools, like IBM Security Identity Governance and Intelligence (IGI) and IBM Security Identity Manager…
-
IGDM Part 3 – Implementing the Identity Governance Data Model
This article is the third in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This third article suggests an implementation of the module using a SCIM-like approach. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA)…
-
IGDM Part 2 – Validating the Proposed Identity Governance Data Model
This article is the second in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This second article validates the model against some common complex applications. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The…
-
IGDM Part 1 – Proposing an Identity Governance Data Model
This article is the first in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This first article proposes the model. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The proposed IGDM is designed to…
