November 2013
Intermediate to advanced
648 pages
13h 27m
English
Frank P. Bresz and Ertem Osmanoglu
This chapter focuses on the implementation methodology and approach for identity and access management (IAM) capabilities. Implementation of IAM capabilities is much more than a coding or technology product installation exercise. There are a wide variety of implementation choices and options available. Additionally, the integration of IAM toolkits and products into the environment can touch nearly every other facet of computing across the enterprise, impacting the daily interaction of users and business processes.
Identity and access management; federation; entitlement; profile; authentication; authorization; implementation; governance; planning and ...