Essentials

IAM Essentials: Lifecycle Management


Looking
Into IGA or life cycle management, which is about integrating HR and others to target systems. There are still a couple of vendors which provide a pure play identity provision solution compared to many vendors which have an integrated IGA system. It's more the technical baseline capability, which cares for bringing data from source to targets. So the technical flow of information from source system to target systems with connectors to both sites source and target systems is what lifecycle management or identity provisioning is about. So it ensures this automated provisioning with the changes of identity and entitlements in target systems. What are the main capabilities here?
One of the key and essential features is having connectors to the source and the target systems and systems in that space clearly differentiate by the breadth of connectors. So how many connectors to which types of systems do they have? Do they support all the new SAS services you're onboarding? Do they support specific systems? Maybe if you have a mainframe and other stuff and the connector death. So how deeply are they integrated? If you take SAP a as a very complex authorization model with business roles and single roles and authorization, objects and transactions. So how deep can they integrate? These are very important aspects to look at. When you look at the capabilities, they also usually come with some level of data mapping and data integration capabilities. So unless you rely on a specific data integration platform, this might be where you map data, which comes from different HR system and other sources. And there's the importance of the automated provisioning flow. So how can you automate the flow for the things which don't need an involvement of the users? How can you also reach out for involvement of users where required triggering the workflows for human interaction whenever required,
And last, not least. There's also the concept of automated reconciliation, which is looking at, for instance, active directory and looking at what has changed since the system last provisioned to active directory. And if there's something happening as a change directly in active directory, that is a situation which should be identified because there might be unauthorized changes, at least changes, bypassing your lifecycle and provisioning. And then you need to act on these, identify these, roll them back, or at least involve someone to identify whether this is correct. This is lifecycle management piece of IGA.

Video Links

Stay Connected

KuppingerCole on social media

Related Videos

Webinar Recording

Multi-Cloud Identity Governance 101

In an effort to cut costs, improve efficiencies, and cater for a mobile and remote workforce, businesses are adopting cloud services from multiple providers. This has created a host of challenges in managing identity and access across multiple clouds, and has introduced several risks that…

Webinar Recording

Dealing Effectively with Modern, Industrialized Cyber Threats

The cyber threat landscape has become very complex, with state-of-the-art intrusion, ransomware, and cryptocurrency mining tools now readily available through online stores and service providers, and an expanding attack surface due to increased cloud computing and remote working. Keeping…

Webinar Recording

Mitigate Risks, Cut Cost, and Achieve Compliance With AI-Driven IGA

Effective Identity Governance and Administration (IGA) is becoming increasingly important as digital transformation, cloud computing, and remote working increase the scope and complexity of Identity and Access Management (IAM) to new levels. But legacy role-based access control (RBAC)…

Webinar Recording

Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung…

Webinar Recording

Understanding the IGA-Focused Identity-as-a-Service (IDaaS) Market

The IDaaS market combines Access Management functions with Identity and Access Governance capabilities, and delivers them as a cloud-based managed service designed to meet the common IAM requirements of hybrid IT environments, but finding the right IDaaS solution with a focus on Identity…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00