Tag: Identity

  • The Combined Power of Okta Privileged Access and Okta Identity Governance

    This article looks at the benefits of combining Okta Privileged Access with Okta Identity Governance to reduce the risk of using privileged accounts and access. Introduction Both Okta Privileged Access (OPA) and Okta Identity Governance (OIG) are part of the Okta Workforce Identity Cloud platform (Okta WIC). OIG is focused on governing identities – having…


  • How Much Workflow Do You Need for Your IGA Project?

    Workflow is a core capability in any Identity Governance and Administration (IGA) deployment; IGA is all about automating the business processes around managing and governing users and their access.  IGA deployments often take much longer than anticipated and don’t achieve all of what the project set out to do. Why? There are many factors, but…


  • Risk-based Access Approval with IBMs IGA Products

    Identity Governance and Administration (IGA) solutions are all about reducing the risk to businesses that users and their access represent. But they also need to maintain an ease-of-use so that users don’t find ways to circumvent IGA controls and introduce more risk.   With IGA tools, like IBM Security Identity Governance and Intelligence (IGI) and IBM Security Identity Manager…


  • IGDM Part 3 – Implementing the Identity Governance Data Model

    This article is the third in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This third article suggests an implementation of the module using a SCIM-like approach. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA)…


  • IGDM Part 2 – Validating the Proposed Identity Governance Data Model

    This article is the second in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This second article validates the model against some common complex applications. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The…


  • IGDM Part 1 – Proposing an Identity Governance Data Model

    This article is the first in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This first article proposes the model. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The proposed IGDM is designed to…


  • Welcome to IAmDavid

    Welcome to my IAM (Identity and Access Management) blog, focusing on IGA (Identity Governance and Administration), PAM (Privileged Access Management) and associated aspects of IAM. I’ve been writing articles on IBMs Security Community and LinkedIn, but I thought it would make more sense to have them in one place – here. Since starting the blog…