Identity and access management business performance through connected intelligence

This book provides a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. It provides reusable templates and source code examples in Java, XML, and SPML

Saved in:
Bibliographic Details
Main Author: Osmanoglu, Ertem (Author)
Format: Book
Language:English
Published: Waltham, MA Syngress 2013
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • 1. Business requirements and business case development
  • 2. IAM framework, key principles and definitions
  • 3. Current state and capability maturity
  • 4. Common challenges and key considerations
  • 5. Case study : access reviews
  • 6. Future state definition
  • 7. IAM roadmap and strategy
  • 8. Identity and access intelligence : a risk-based approach
  • 9. Enabling business through cloud-based IAM
  • 10. Case study : future state
  • finding a way out of the labyrinth
  • 11. Implementation methodology and approach
  • 12. Access request, approval, and provisioning
  • 13. nforcement
  • 14. Access review and certification
  • 15. Privileged access management
  • 16. Roles and rules
  • 17. IAM product selection
  • 18. Case study : implementation
  • 19. The future of identity and access management