Integrated
Solutions

Identity Management (IDM)

What Is Identity Management?

Identity Management integrates your existing infrastructure into an intelligent and automated framework to reduce costs, increase security, and ensure compliance for your organization.

Of all the disciplines within identity and access management, Identity Management has the broadest application. The identity management software available from Okta, SailPoint or MicroFocus offers an endless list of initiatives to pursue. The good news is that most organizations end up implementing similar solutions with 80% of functionality being similar.

Identity Management Allows You To:

Manage, Provision &
De-provision Identities

Streamline User
Administration

Reduce
Management Costs

Increase
Productivity

Increase
Security

Comply
with Regulations

Identity Manager’s Key Benefits:

  • Zero trust implementation
  • Meeting compliance requirements
  • Extending governance to the cloud
  • Reduced risk exposure

The Most Common IDM Projects

Authoritative Source
Here, typically an HR feed is connected to the identity management tool to serve as the authoritative source of identities.

Provisioning Connectors
Typically 3-7 applications are selected for automated provisioning in a Phase I IDM project, then as the implementation matures this could lead to dozens if not hundreds of provisioning connectors.

New Hire Onboarding
With the HR feed, now the identity management tool can detect new hires and take action.

Here is the common setup for new hires:

  1. Generate a unique network name and email address
  2. Email manager about new hire
  3. Assign roles to the user based on their HR job position or locations
  4. Automatically provision accounts
  5. Send welcome email on employees start date with instructions
Terminations
With terminations detected from the HR feed, the identity management system can handle the majority of tasks associated with terminations.

Here is a typical setup:

  1. Deprovision access automatically to all connected applications
  2. Open tickets to manually remove access to non-connected applications
  3. Disable primary network account
  4. Schedule a future job to delete primary network account
  5. Email manager and IT teams about the termination
  6. Allow manager delegated access to the terminated employee’s inbox
Self-Service Workflows
With the identity management system connected to the core application, tools at the organization workflows can be implemented to enable the workforce to manage self-service type tasks which reduces help desk tickets and speeds up the workforce.

Here are some common workflows:

  1. Contractor Management Workflow – Request contractor accounts, extend contractors and terminate contractors.
  2. Non-User Accounts – Workflow to request and manage service, test, admin and mailbox accounts.
  3. Contractor to Employee Workflow – Workflow process to make the necessary changes when a user transitions from a contractor to a full-time employee.
  4. Advanced Access Approval Workflow – Here when an access request is made, particularly for sensitive access, a custom approval workflow is created to ensure specific teams and people sign-off before access is provisioned.

How to Get Started with Identity Management

No matter where you are in your IDM maturity, GCA can help you take the next step. Our IDM workshop can help you determine your current IDM maturity and the specific steps your organization needs to take to continue your journey.

Book a 15-minute call with an IDM expert to get started.

BUSINESS OUTCOMES

IDM Solutions Partners

SailPoint IdentityIQ Lifecycle Manager

MicroFocus Identity Manager (IDM)

Okta Lifecycle Management

RECOMMENDED IAM CONTENT