In the current business arena, employees, consultants, and business partners come and go regularly. The need constantly grows for tightened security, accelerated user changes, and reduced operating costs. More people need access to more resources. Provisioning these resources and managing who gets what is a time-consuming process. Let’s discover how IBM Security Identity Manager can answer to these challenges.
To stay competitive in today’s economy, companies face difficult resource provisioning challenges:
• Maintaining absolute security by quickly eliminating inactive user accounts
• Remaining agile as they manage access rights among a growing number of business operating systems, each with its own access characteristics
• Addressing essential e-business initiatives quickly and efficiently, giving a growing number of customers, suppliers, and partners access to enterprise systems
With IBM Security Identity Manager you can efficiently, securely, and easily meet these challenges.
IBM Security Identity Manager allows you to automate and centralize access rights management and provisioning across all systems, applications, and databases in your enterprise.
• Automated provisioning of accounts and access rights
• Role-based access control (RBAC)
• Central control of privileged data
• Web-based system for easy privilege changes
• User self-service and self-registration
• Recertification system to revalidate users, accounts, and accesses
• Shared credential check-in, check-out, and management
• Integrated workflow engine to authorize users and accounts
• Report generation
Every organization is composed of two primary components: people and resources. As an IBM Security Identity Manager administrator, you must provide the people with access to the resources and deliver the resources to the people. Most organizations run various business systems to conduct business. The IBM Security Identity Manager administrator is responsible for provisioning access to these business systems to authorized users in the organization. These resources include:
• Email, examples: Lotus Notes®, Microsoft Exchange Online
• Systems, examples: Active Directory, AIX, and Linux
• Databases, examples: IBM DB2®, Oracle, and Sybase
• Applications, examples: PeopleSoft, and SAP
• Network resources, examples: file servers, network file shares, and printers
As with most organizations, provisioning these resources can be a time-consuming process, especially if they are manually provisioned through email requests, paper forms, and so on. Because of the overwhelming amount of requests, turnaround time for granting access to a new user can range from 5 to 12 days, if not longer. Even revoking access can take as long. In some cases, revoking access might never take place.
In the next article, I will talk about ISIM architecture and dependencies, and we attack some advanced topics covered by the solution.
IBM Security Identity Manager: http://www-03.ibm.com/software/products/en/identity-manager
Latest posts by AYOUB BAHAR (see all)
- Facebook has yet proven than user privacy isn’t a priority! - April 21, 2020
- ISIM REST API Samples - July 10, 2019
- IBM DB2 HADR: Dummy guide - April 13, 2019