Identity Management

"Identity Management is a process of managing information used to identify users, control user access, determine user privileges, and delegate administrative authorities"

When it comes to employees, their lifecycle are in motion, their roles and responsibilities will be changing frequently. As employees are given newer roles or transferred to different departments in an organization, their access rights needs to be reviewed , updated according to the role and also their old access rights needs to be deleted. Even though authorization is very important, the speed of authorization is also very important so that the employee can start using his applications immediately without wasting more time. Security policies are very important in an organization, the identity management tool should have the feature to create policies, modify policies and implement it by the administrators. Predefined reports and audits should allow to view the activity and security state of an organization.

Automate the management of user account lifecycle to internal systems and applications

User lifecycle management
Enterprise password synchronization
Role Based Access Control (RBAC) based provisioning/De-provisioning
Directory/End-point integration

Federated Identity Management
FIM is an arrangement for managing identities and access to resources that span companies or security domains. It avoids Identity replication and security administration at multiple locations. It provides an easy way of managing identities and providing them with access to information and services in a trusted manner. In a federated system, a group of organizations share identity attributes based on mutual trust and agreed-upon standards, facilitating authentication from other members of the federation and granting appropriate access to online resources. For companies deploying service-oriented architecture (SOA) and Web services, FIM provides policy-based integrated security management for federated Web services. The foundation of FIM is trust, integrity and privacy of data.

Access Management
"Access management is about managing consistent sets of access control policies across enterprise systems"

It is a system which is used to manage the access of resources by employees on a daily basis. Employees can access different applications but just authenticating once. They need not remember many user names and passwords for different applications, this is possible by using Single Sign on technology. Access management solutions are implemented with broader services which help in IT processes and events related to users.

Manage access to internally and externally exposed systems and applications

Centralized Access Control for enterprise
Web Single Sign On
Access related logging
Access Reviews and Certification
Integration of internal applications with centralized access control mechanism