Product Report: Sun Identity Manager

Report Details

Sun Identity Manager is one of the most well-known products in the Enterprise Provisioning market segment. The product has been continuously improved over the course of the last years, with significant changes especially within the last two releases (7.0 and 8.0). It supports all core features we expect from products in that market segment, with strong provisioning capabilities and a broad set of connectors.

The biggest shortcoming from our perspective is that changes in the user interfaces and to workflows might become relatively complex, requiring XML and Java knowledge and the use of the (well-integrated) IDE. Anyhow, the platform provides a high degree of flexibility and is feature-rich.

A specific strength of the product is the tight integration with Sun Role Manager, despite the fact, that the architecture and user interfaces of these both tools aren’t fully synchronized yet. The integration provides a strong level of GRC capabilities going well beyond what Sun Identity Manager offers as out-of-the-box support for GRC features.

From the perspective of Kuppinger Cole, Sun Identity Manager is amongst the leading-edge products in the Enterprise Provisioning market segment. Thus it should be part of evaluations when choosing provisioning products.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jan 23, 2009

Product Report: Sun Identity Manager

Sun Identity Manager is one of the most well-known products in the Enterprise Provisioning market segment. The product has been continuously improved over the course of the last years, with significant changes especially within the last two releases (7.0 and 8.0). It supports all core…

€95.00
excl. VAT
Get Access
Mastercard Visa PayPal INVOICE

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Future-Proofing Your Cybersecurity Strategy

It’s May 25 today, and the world hasn’t ended. Looking back at the last several weeks before the GDPR deadline, I have an oddly familiar feeling. It seems that many companies have treated it as another “Year 2000 disaster” - a largely imaginary but highly publicized issue [...]

Latest Insights

Hot Topics

Spotlight

Compliance, Risk & Security Learn more

Compliance, Risk & Security

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00