Implementation Methodology and Approach
Frank P. Bresz and Ertem Osmanoglu
This chapter focuses on the implementation methodology and approach for identity and access management (IAM) capabilities. Implementation of IAM capabilities is much more than a coding or technology product installation exercise. There are a wide variety of implementation choices and options available. Additionally, the integration of IAM toolkits and products into the environment can touch nearly every other facet of computing across the enterprise, impacting the daily interaction of users and business processes.
Keywords
Identity and access management; federation; entitlement; profile; authentication; authorization; implementation; governance; planning and ...
Get Identity and Access Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.