Identity Management Series – HR as a Source of Record Part 3: Transfers
In the last article, we discussed the HR considerations for enabling auto-provisioning/auto-assignment of tasks for new hires. Now we’ll address transfers. Employees are, by definition, only hired...
View ArticleIdentity Management Series – HR as a Source of Record Part 4: Terminations
In the last article, we discussed how to identify access transfers from HR data. Now we’re in the home stretch: terminations. Compared to transfers, terminations are pretty easy, but there are a...
View ArticleIdentity Management Series – HR as a Source of Record Part 5: Reliability and...
We’ve now gone through the employee’s full lifecycle and discussed how to interpret and manipulate HR data to facilitate automation in identity management for new hires, transfers, and...
View ArticleIdentity Management Series – Role- and Rule-Basing Part 1: Introduction
At this point in the identity management process it is time to consider what access the company’s job functions should have to begin creating roles and rules. This is the first step in automating...
View ArticleIdentity Management Series – Role- and Rule-Basing Part 2: Identifying &...
The first step in role- and rule-basing is identifying and prioritizing the enterprise roles. This sets the direction for the entire effort, which – make no mistake – will be time consuming. Doing...
View ArticleIdentity Management Series – Role- and Rule-Basing Part 3: Designing and...
Now that enterprise roles have been identified and prioritized, it’s time to tackle IT roles, and figuring out IT roles is where the rubber meets the road. Chances are, neither the department heads...
View ArticleIdentity Management Series – Role- and Rule-Basing Part 4: Documentation and...
Once all of the roles are defined, it’s time to document them and obtain approval for their use. We’re now past the point where the distinction between enterprise and IT roles matters, so in this...
View ArticleIdentity Management Series – Role and Rule Basing Part 5: Implementation and...
The final step in this month’s activity is to implement the roles and clean up any extraneous access that’s left behind. As in the previous segment, the distinction between enterprise and IT roles...
View ArticleIdentity Management Series – Workflows Part 1: Introduction
We started developing workflows in last month’s activity to manage vacancies. Relatively speaking, vacancy management workflows are comparatively simple and provide business-relevant quick-wins,...
View ArticleIdentity Management Series – Workflows Part 2: Provisioning and Deprovisioning
In this month’s Introduction, three workflow sets were introduced: Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User or access recertification This...
View ArticleBuilding the Foundation for Successful Password Self-Service Part 2: Password...
In my last article, we explored how a properly implemented password self-service mechanism can yield a quick and early return on the identity management journey. Password self-service is a cornerstone...
View ArticleBuilding the Foundation for Successful Password Self-Service Part 3:...
So far we have established the value of properly implementing password self-service and successfully tackled building effective password governance. The next step is to develop “challenge...
View ArticleBuilding the Foundation for Successful Password Self-Service Part 4: Initial...
In the last article, we discussed how to establish appropriate challenge questions to facilitate password self-service. But that’s just half of the password self-service equation. The other half has...
View ArticleBuilding the Foundation for Successful Password Self-Service Part 5: User...
So far this month, we’ve updated the <password policy>, created appropriate <challenge questions>, and come up with a strategy for setting initial passwords. Now we are ready to start...
View ArticleIdentity Management Series – HR as a Source of Record Part 2: New Hires
In my last article, I introduced the importance of understanding the HR system and putting that into the context of using HR data to manage identities. This is a big challenge because while the HR...
View ArticleIdentity Management Series – HR as a Source of Record Part 3: Transfers
In the last article, we discussed the HR considerations for enabling auto-provisioning/auto-assignment of tasks for new hires. Now we’ll address transfers. Employees are, by definition, only hired...
View ArticleIdentity Management Series – HR as a Source of Record Part 4: Terminations
In the last article, we discussed how to identify access transfers from HR data. Now we’re in the home stretch: terminations. Compared to transfers, terminations are pretty easy, but there are a...
View ArticleIdentity Management Series – HR as a Source of Record Part 5: Reliability and...
We’ve now gone through the employee’s full lifecycle and discussed how to interpret and manipulate HR data to facilitate automation in identity management for new hires, transfers, and...
View ArticleIdentity Management Series – Role- and Rule-Basing Part 1: Introduction
At this point in the identity management process it is time to consider what access the company’s job functions should have to begin creating roles and rules. This is the first step in automating...
View ArticleIdentity Management Series – Role- and Rule-Basing Part 2: Identifying &...
The first step in role- and rule-basing is identifying and prioritizing the enterprise roles. This sets the direction for the entire effort, which – make no mistake – will be time consuming. Doing...
View Article
More Pages to Explore .....