Identity and Access Management Simplified
Identity and Access Management Simplified
Simplified
Reasons for starting an Identity and Access
Management project and practical tips to ensure
success
Identity and Access Management
Simplified
Identity and Access Management (IAM) and Identity and
Access Governance (IAG) have become key components of an
organisation’s security posture. There are countless reasons
why an organisation would choose to start an IAM or IAG
project. For those that are starting on this journey, one thing is
crucial – to be completely transparent about the justifications
and objectives for organisational spend on such a project.
Alongside this, understanding the common pitfalls and practical
tips prior to starting your project will add to its success and overall
effectiveness.
2
Entitlement Management
Strong Authentication
Access Certification
Identity Federation
Role Management
Identity Directory
Single Sign-On
User Lifecycle
Areas Examples of issues and use cases
3
Entitlement Management
Strong Authentication
Access Certifications
Identity Federation
Role Management
Identity Directory
Single Sign-On
User Lifecycle
Areas Examples of issues and use cases
4
Preconceived ideas and pitfalls to avoid
before starting your project
An IAM or IAG project is not only about deploying a technical
product. Many functions and departments across the organisation
are involved in the implementation. It is a functional and
organisational project, which can fail if insufficient attention is
paid to a series of points. This section will help organisations to
identify preconceived ideas and pitfalls and look at how they can
be avoided.
PRECONCEIVED IDEA:
“IAM is a magic bullet”
Unfortunately, there is nothing magical about IAM. You can’t use it as
a magic wand to deal with blurred organisational lines, the inconsistent
definition of job profiles or technical degeneration that makes
applications incompatible with current standards.
For example, an IAM project will not integrate all IS applications into its
scope, at least in the first phases of the project, such as the ‘accounts
and rights provisioning strand’. It is important to be clear as to where
your IAM project ends and where IS starts. You need to be realistic and
communicate clearly about the scope of your project, even at the initial
stages, to avoid this. If necessary, you will also need to be prepared to
adapt to market technologies, internal processes, budget, etc.
PRECONCEIVED IDEA:
“Manage the project yourself to save time
and have fewer headaches”
Implementation of this type of project very often impacts on the whole
organisation. IAM is a cross-functional project that can disrupt the
organisation, so it is essential to communicate with and involve all the
stakeholders. This will include business lines, HR, general management,
the IT department, management, controllers and auditors. A good way
to gain support is to identify a problem that affects a department or
individual and work closely with them from the outset to resolve the
issue.
5
PITFALL:
“Buying the software package before you
have even defined your need”
This is one of the biggest mistakes that happens to organisations during
the implementation of an IAM project. For the most part, IAM packages
do what they are designed to do, but that is not to say they all do it in
the same way, with the same functional coverage.
However, once you have chosen your solution, the approach needs
to change. It is essential that you investigate exactly how the solution
functions, perhaps seeking help from a partner, so that your plans are
in accordance with the general capabilities of the solution. This will limit
special developments. In addition, functionalities not accounted for at
the outset may be available and make it easier to accommodate some
use cases.
PITFALL:
“Wanting to do everything at once”
Pay close attention to the initial scope. You should forget about
implementing your IAM project in one fell swoop. An iterative approach
is by far the best course of action: break it down into functional modules,
geographical or organisational units, user populations or application
scopes, etc.
6
PITFALL:
“Short-term thinking”
Just because the IAM solution has been implemented, it doesn’t mean it
stops there. IAM is a very dynamic system which long outlasts the initial
build. It is crucial you know who will be managing the project once this
initial phase is complete, who will operate it, who will upgrade it, etc.
This means having a service continuity guarantee; without one there is
not much point starting at all.
PITFALL:
“Thinking you know how people work day to
day”
You know how your company is organised from a high-level perspective,
its main business areas, its key specific features, how it has changed in
the past and perhaps how it might evolve in the future.
7
Six best practices for starting your IAM
or IAG project
8
Get away from ambiguous names:
5 The vocabulary used seems easy and understandable to all, but do not be
mistaken. Is everyone in your organisation aware of the difference between a
credential and an authorisation? How about authentication and identification?
What is the definition of an account, a role and a profile? Mastering the
various terms used in this type of project to avoid misinterpretations is vital to
the smooth running of an IAM implementation. Putting together a presentation
and an internal glossary, illustrated with relevant examples, is very often a
good way of ensuring everyone speaks the same language.
9
ABOUT ILEX INTERNATIONAL
Ilex International is a European Identity and Access Management (I&AM)
software vendor. Founded in 1989 Ilex offers a comprehensive range
of solutions including identity management (identity, rights and role
management) and access management (authentication, access control, SSO,
identity federation and card management.) The organisation invests heavily in
R&D, providing state of the art technology and services to a large international
customer base across finance, defence, healthcare, government and retail
sectors.
SOURCE
CLUSIF, ‘Identity and Access Management/Governance Practical guide
– Implementation’, https://clusif.fr/publications/identity-and-access-
managementgovernance-practical-guide-implementation/
ILEX INTERNATIONAL
[email protected]
www.ilex-international.com/en/