Starting the revolution: Implementing an identity management architecture

Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

Abstract

The chapter argues that an enterprise should develop its own Identity Management Architecture (IdMA)before attempting any Identity Management implementation. It begins with a discussion of the developmentof the Reference IdMA. It also discusses the issues of how to incorporate existing enterprise workflowsand processes and other specific needs of an enterprise into an IdMA. It proposes the incorporationof existing information security controls into the IdMA by the use of chokepoints to monitor identifiedsecurity hotspots. The issues surrounding the privacy of personal data as well as the protection of corporatedata and assets are discussed and it is shown how these issues may be addressed and includedin the Reference IdMA. Finally, there is a discussion of how to include federation with other enterprisesas part of the enterprise's IdMA.
Original languageEnglish
Title of host publicationDigital identity and access management
Subtitle of host publicationTechnologies and frameworks
EditorsManish Gupta Manish Gupta
Place of PublicationHershey PA
PublisherInformation Science Reference
Chapter9
Pages148-167
Number of pages20
ISBN (Electronic)9781613504994
ISBN (Print)9781613504987
DOIs
Publication statusPublished - 2012

Fingerprint

Dive into the research topics of 'Starting the revolution: Implementing an identity management architecture'. Together they form a unique fingerprint.

Cite this