Product Report: Sun Identity Manager

Report Details

Sun Identity Manager is one of the most well-known products in the Enterprise Provisioning market segment. The product has been continuously improved over the course of the last years, with significant changes especially within the last two releases (7.0 and 8.0). It supports all core features we expect from products in that market segment, with strong provisioning capabilities and a broad set of connectors.

The biggest shortcoming from our perspective is that changes in the user interfaces and to workflows might become relatively complex, requiring XML and Java knowledge and the use of the (well-integrated) IDE. Anyhow, the platform provides a high degree of flexibility and is feature-rich.

A specific strength of the product is the tight integration with Sun Role Manager, despite the fact, that the architecture and user interfaces of these both tools aren’t fully synchronized yet. The integration provides a strong level of GRC capabilities going well beyond what Sun Identity Manager offers as out-of-the-box support for GRC features.

From the perspective of Kuppinger Cole, Sun Identity Manager is amongst the leading-edge products in the Enterprise Provisioning market segment. Thus it should be part of evaluations when choosing provisioning products.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jan 23, 2009

Product Report: Sun Identity Manager

Sun Identity Manager is one of the most well-known products in the Enterprise Provisioning market segment. The product has been continuously improved over the course of the last years, with significant changes especially within the last two releases (7.0 and 8.0). It supports all core…

€95.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

IGA in a World of Zero Trust

IGA in a World of Zero Trust
Richard Hill

Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “never (blindly) trusts”, but “always verifies.” This traditionally meant verifying Who has access to What resource. In the past, the Who typically meant a human with a digital identity being given access to some application within an organization. Once the individual was given access to said application, that individual would be verified [...]

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00