Friday, May 10, 2019
Identity management challenges Essay Example | Topics and Well Written Essays - 750 words
Identity management challenges - Essay ExampleThe same user profile may be replicated a number of successions in dissimilar applications, each time with a different level of find permission. In large organizations competently managing user profiles - ensuring that they have the correct authorizations - is a time consuming, and therefore expensive - procedure for IT staff and managers.Increased regulatory compliance requirements such as information Protection legislation in the European Union and Sarbanes-Oxley crosswise the US mean that organizations are at greater risk of financial penalties and the loss of goodwill if they are perceived to be non-compliant.In a typical mesh each account h sure-enough(a) needs to be authenticated, authorized and granted access permissions to network objects. In order to share data users must be able to access the same network objects. This requires the IT users and mangers to spend precious time walking over the same ground, with perhaps one or two changes in access permission on a case by case basis. For organizations with thousands of network users this is neither time nor personify effective for IT teams/managers or ultimately network users.IAM solutions are relatively new, and harp of an integrated stable of tools. Increasingly these tools are based upon open standards to ensure as much reflexive compatibility as possible with legacy systems. The tools assist organizations to streamline identity management, manage data consistently across different platforms and hence enhance regulatory compliance. Well known tools includeCentralized user directories (such as light-weight directory access protocol, LDAP) - to track a users credentialsPassword management systems - allow users to reset their passwords using a variety of means of authenticationAccess management (or provisioning) systems - manage user access to multiple systems. much(prenominal) systems usually provide workflow capabilities to handle change requests from users or departments. Web access management tools - originally used to manage user access to multiple web-based applications.Single put upnce on systems - allow users to sign on once for access to multiple applications. Costing an IAM integration project depends on the number of users, types of applications already installed, platform interoperability, the time-scale, the amount of expertise within the organization and so forth, leading to a wide change in final project costs. It is very difficult to centrally manage multiple applications, particularly when they reside on different operating systems and hardware platforms, with different authentication and authorization protocols. A minimum cost for implementing an IAM is $100,000 per annum in license fees (in a market which is predicted to grow from $1.2b in 2005 to $8b by 2009) (Tynan, page 2). The most high-priced and time consuming area of digital identity management is support for legacy systems (such as mainframes a nd older applications). Such systems rarely support external user management tools in the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.