This chapter provides an overview of the end-to-end Identity Governance process and insights into how best to approach the problem. Later, we will provide an organizational-, project-, and deployment-focused set of recommendations. This chapter is focused on the technology and what to look for when selecting and deploying an enterprise-grade Identity Governance solution.
This chapter lays out the basic steps and major process involved in an Identity Governance (IG) program. It starts with how to establish visibility and ...