Maximizing the Value of Identity Management
Facebook Twitter LinkedIn

Maximizing the Value of Identity Management

Combined Session
Wednesday, May 06, 2009 15:00—16:00
Location: IMAX

Presentation first suggests as the basis for Identity management value model the usage of Identity transactions. Identity transactions is defined as sum of rights requests + sum of amounts of rights delivered. Additionally, each transaction is given a euro sum value which results into tangible value delivered by IDM.

The presentation next discusses the relevant parts of the role based access management model implementation that bring most value as based on the IDM value model. Discussed elements are e.g. different kind of approval flows, inherited membership approvals, privileges inheritance, delegated management of privilege and role structures, traceability of current permissions/permissions under approval or delivery/historical permissions, inheritance of the membership constraints in the role hierarchy, possibility to reconcile memberships with the target systems in case manual provisioning is used.

Maximizing the Value of Identity Management
Presentation deck
Maximizing the Value of Identity Management
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Kari-Pekka Lifländer
Kari-Pekka Lifländer
Nokia
K-P joined is responsible for centralized identity lifecycle and access management solution, that controls access rights to over 200 applications in in Nokia and to more than 150.000 access roles...
Subscribe for updates
Please provide your email address