Advisory Note: Identity & Access Management/Governance Blueprint - 70839

Report Details

This blueprint aims to provide an overview of IAM/IAG to the informed user, helping them to better understand the “big picture” of IAM, including technologies such as Identity Provisioning, Access Governance, strong- and risk-based authentication and authorization and Access Management. Within this broad set of technologies, there is ongoing change and evolution. Access Governance and Identity Provisioning products are merged by some vendors, new Cloud IAM solutions integrate user management and access management.

The blueprint starts by defining the requirements process for the IAM/IAG environment, showing the important building blocks that need to be in place for identity and access control. This builds into a “Big Picture” overview, which is then broken down further to show interdependencies between the components of different technology areas. These can be used as reference patterns for architecture, project and programme management.

These reference patterns are based on controls which can be identified in the use cases listed after the big picture. These pick out a number of areas, giving not just examples of access and identity management, but of governance and risk management across the whole environment. From this perspective we are able to drill down, into the technical detail of the big picture and discuss some of the integration points for IAM/IAG which may be of practical use, and the pros and cons of doing so.

A short discussion of maturity levels shows what is common today in IAM/IAG today at level 3, as opposed to the ideal at maturity level 5. We expect to see a lot of connected enterprise/hybrid Cloud IAM as maturity level 3 in 2017, with today’s level 5 quickly becoming tomorrow’s expected level 3.

Finally, we wrap up with a few hints and pointers of how to succeed with the blueprint and implementing it in a real corporate environment.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jun 02, 2014

Advisory Note: Identity & Access Management/Governance Blueprint - 70839

This blueprint aims to provide an overview of IAM/IAG to the informed user, helping them to better understand the “big picture” of IAM, including technologies such as Identity Provisioning, Access Governance, strong- and risk-based authentication and authorization and Access…

€995.00 Get Access

Latest Related Reports

Executive View

Executive View: RSA Identity Governance and Lifecycle - 72503

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment…

Executive View

Executive View: ForgeRock Access Management - 71316

ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system.  It provides numerous authentication options, an adaptive risk engine, identity federation, and advanced policy-based authorization capabilities.   ForgeRock supports open standards…

Leadership Compass

Leadership Compass: CIAM Platforms - 71171

Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms.  Your compass for finding the right path in the market.

Advisory Note

Advisory Note: Consumer Identity and Access Management for “Know Your Customer”

Consumer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty. Enterprises want to collect,…

Executive View

Executive View: Avatier Identity Management Suite - 71510

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

Executive View

Executive View: Ergon Airlock Suite - 72509

Ergon Informatik, a Swiss software vendor, delivers an integrated solution for Web Access Management, Identity Federation and Web Application Firewall capabilities that shows both breadth and depth in features. Furthermore, it comes with a good set of baseline identity lifecycle management…

Leadership Brief

Leadership Brief: Transforming IAM – not Panicking - 71411

Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM. 

Executive View

Executive View: Deep Identity - 71453

Managing provisioning into an identity repository is a basic organizational process that varies remarkably between organizations. Some companies have a highly functional process that minimizes manual input and maximizes efficiency. Others have very manual processes that are costly and open…

Executive View

Executive View: ForgeRock OpenIDM - 71317

ForgeRock OpenIDM is a standards- and platform-centric product which combines proven reliability with ForgeRock’s commitment to innovation. Given the growing importance of customer-centric identity management, OpenIDM’s focus on performance, flexibility and the management of not…

Executive View

Executive View: Microsoft Azure Active Directory - 71550

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage business partners, customers, and Cloud service access in a combined service.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

GDPR and Customer Data - Eyes on the Stars and Feet on the Ground

Big data analytics is getting more and more powerful and affordable at the same time. Probably the most important data within any organisation is knowledge of and insight into its customer's profiles. Many specialized vendors target these organisations. And it is obvious: The identification of [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Digital Finance

The emergence and prominence of bitcoin and its underlying technology Blockchain with open source, real-time payments capabilities and without centralized regulatory authority has sparked the Financial Services industry into exploring how Blockchain technology might be applied to mainstream banking and insurance sectors. Blockchain technology goes further than just a distributed ledger. Another initiative gaining acceptance is Smart Contracts that use computer protocols to facilitate, verify, or enforce the negotiation or performance of a contract or that obviate the need for a contractual [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00