Book description
Identity and Access Management: Business Performance Through Connected Intelligenceprovides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.- Focuses on real-word implementations
- Provides end-to-end coverage of IAM from business drivers, requirements, design, and development to implementation
- Presents a proven, step-by-step method for deploying IAM that has been successfully used in over 200 cases
- Includes companion website with source code examples in Java, XML, and SPML as well as reusable templates
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Foreword
- Preface
-
Introduction
- Abstract
- Business Case and Business Requirements
- IAM Framework, Key Principles, and Definition
- Current State and Capability Maturity
- Key Challenges and Critical Success Factors
- Future State and IAM Roadmap
- Implementation Methodology and Approach
- Roles and Rules
- IAM Product Selection
- Technology and IAM Forecast
- Case Studies
- Companion Materials
- Acknowledgments
- Author and Editor Biographies
-
Section 1: Business Case and Current State
-
Chapter 1. Business Requirements and Business Case Development
- Introduction
- An IAM Business Case: What Is It, Exactly? Why Is It Important?
- Types of Business Cases for IAM
- A Strategic Approach to Developing an IAM Business Case
- Summary
- Appendix A Sample Table of Contents for Requirements
- Appendix B Sample Requirements Document
- Appendix A Sample Table of Contents for Requirements
- Appendix B Sample Requirements Document
- Chapter 2. IAM Framework, Key Principles, and Definitions
- Chapter 3. Current State and Capability Maturity
- Chapter 4. Common Challenges and Key Considerations
- Chapter 5. Case Study: Access Reviews
-
Chapter 1. Business Requirements and Business Case Development
- Section 2: Future State and Roadmap
-
Section 3: Implementation
- Chapter 11. Implementation Methodology and Approach
- Chapter 12. Access Request, Approval, and Provisioning
- Chapter 13. Enforcement
- Chapter 14. Access Review and Certification
- Chapter 15. Privileged Access Management
-
Chapter 16. Roles and Rules
- Rules and Enforcement
- The RBAC Model and the Access Management Life Cycle
- RBAC Implementation Considerations
- Guiding Principles and Lessons Learned
- Conclusion
- Appendix Sample RBAC Work Products and Artifacts
- Appendix A Sample—Processes and Governance Process
- Appendix B Sample—RBAC Role Management Processes
- Chapter 17. IAM Product Selection
- Chapter 18. Case Study: Implementation
-
Section 4: Identity and Access Management Forecast
-
Chapter 19. The Future of Identity and Access Management
- 1 Password-Based Authentication. To Paraphrase Mark Twain, the Reports of its Death Have Been Greatly Exaggerated
- 2 It’s Not Your Voice That Will Be Your Password, but It Will Be Your Phone
- 3 Biometrics Authentication Will Remain a Niche for Primary Authentication
- 4 Access Decision-Making Will Become Context Aware
- 5 The Identity Ecosystem Will Finally Emerge
- 6 Privacy Will Take a Back Seat to Security
- 7 Increasing Use of Cloud Services Will Drive Adoption of Federated Authentication
- 8 Entitlement Management Will Shift from Being Technology Centric to Business Centric
- 9 Access Governance Will Become (Near) Real Time
- 10 Identity Repositories Will Move Out of HR
- Conclusion
-
Chapter 19. The Future of Identity and Access Management
- Bibliography
- Index
Product information
- Title: Identity and Access Management
- Author(s):
- Release date: November 2013
- Publisher(s): Syngress
- ISBN: 9780124104334
You might also like
book
Access Control and Identity Management, 3rd Edition
Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and …
book
IT Security Controls: A Guide to Corporate Standards and Frameworks
Use this reference for IT security practitioners to get an overview of the major standards and …
book
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within …
video
SC-300: Microsoft Identity and Access Administrator
The Microsoft Identity and Access Administrator designs, implements, and operates an organization’s identity and access management …