0% found this document useful (0 votes)
37 views

Issues Identity Management

The document discusses issues related to identity management. It notes that the number of systems, applications, users, and complexity of organizations are growing, which increases the problems associated with managing user identities and access across multiple systems. This growth results in more help desk calls related to access issues and increased time spent by administrators managing user accounts and access rights. The document suggests that identity management solutions, such as single sign-on, centralized authentication, and federated identity management can help address these problems by streamlining user access and management. However, these solutions work best when systems, applications, users and business needs are stable and not rapidly changing.

Uploaded by

Varuni Ramki
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

Issues Identity Management

The document discusses issues related to identity management. It notes that the number of systems, applications, users, and complexity of organizations are growing, which increases the problems associated with managing user identities and access across multiple systems. This growth results in more help desk calls related to access issues and increased time spent by administrators managing user accounts and access rights. The document suggests that identity management solutions, such as single sign-on, centralized authentication, and federated identity management can help address these problems by streamlining user access and management. However, these solutions work best when systems, applications, users and business needs are stable and not rapidly changing.

Uploaded by

Varuni Ramki
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

ISSUES in IDENTITY MANAGEMENT

Identity management (IdM)


the management of individual identities,

their authentication, authorization, roles, and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime, and repetitive tasks

How big is the Problem


Number of systems and applications Homogeneous or Heterogeneous Number of users Dynamics of the organization, systems,

applications and users

How big is the Problem continued


Number and growth of calls to your help desk for password

resets and account lockout resets

Amount of Administrator time being spent managing user access Complexity and cost of cross training Administrators Business Processes for:
Adding new users and granting access Changes to access rights

Suspending/restoring access rights


Deletion of access rights

REASONS: Number and complexity of systems, applications, etc. are

growing
Number of users is growing internal as well as external Business requirements are increasing and increasing at an

increasing rate
Increasing calls to the helpdesk and increased Administrators

time
Requires additional IT resources

SOLUTIONS: Single Sign-On Solutions Centralized Authentication to a LDAP directory Federated Identity Management Variety of vendors with solutions offering a range of functions,

features and capabilities from limited to extensive

Works well if:


Number and complexity of systems, applications,

etc. are not growing and are homogeneous


Number of users is not growing internal as well

as external
Business requirements are not increasing, or if

Additional IT resources are not a problem and are

available

ISSUES:
Too Much Rigor Reduces Users Productivity

Tighter Security Measure can Lead to Back-end


Shortcuts Too Much Convenience Decreases end-user confidence Too Much Collection of Personal Information Creates Privacy Risk Poor Manual Control Open the door to SocialEngineering Risk Too Much autonomy Creates Opportunity for Malicious Insiders Ignorance cause Low-Tech Risk

You might also like