O'Reilly logo

Identity and Access Management by Ertem Osmanoglu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11

Implementation Methodology and Approach

Frank P. Bresz and Ertem Osmanoglu

This chapter focuses on the implementation methodology and approach for identity and access management (IAM) capabilities. Implementation of IAM capabilities is much more than a coding or technology product installation exercise. There are a wide variety of implementation choices and options available. Additionally, the integration of IAM toolkits and products into the environment can touch nearly every other facet of computing across the enterprise, impacting the daily interaction of users and business processes.

Keywords

Identity and access management; federation; entitlement; profile; authentication; authorization; implementation; governance; planning and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required