Starting the Revolution

Implementing an Identity Management Architecture

Research output: Book chapter/Published conference paperChapter (peer-reviewed)

Abstract

The chapter argues that an enterprise should develop its own Identity Management Architecture (IdMA)before attempting any Identity Management implementation. It begins with a discussion of the developmentof the Reference IdMA. It also discusses the issues of how to incorporate existing enterprise workflowsand processes and other specific needs of an enterprise into an IdMA. It proposes the incorporationof existing information security controls into the IdMA by the use of chokepoints to monitor identifiedsecurity hotspots. The issues surrounding the privacy of personal data as well as the protection of corporatedata and assets are discussed and it is shown how these issues may be addressed and includedin the Reference IdMA. Finally, there is a discussion of how to include federation with other enterprisesas part of the enterprise's IdMA.
Original languageEnglish
Title of host publicationDigital Identity and Access Management
Subtitle of host publicationTechnologies and Frameworks
EditorsManish Gupta Manish Gupta
Place of PublicationHershey PA
PublisherIGI Global
Chapter9
Pages148-167
Number of pages20
ISBN (Print)9781613504987
DOIs
Publication statusPublished - 2012

Fingerprint

Identity management
An enterprise
Information security
Personal data
Federation
Assets
Privacy

Cite this

White, P. (2012). Starting the Revolution: Implementing an Identity Management Architecture. In M. G. M. Gupta (Ed.), Digital Identity and Access Management: Technologies and Frameworks (pp. 148-167). Hershey PA: IGI Global. https://doi.org/10.4018/978-1-61350-498-7.ch009
White, Peter. / Starting the Revolution : Implementing an Identity Management Architecture. Digital Identity and Access Management: Technologies and Frameworks. editor / Manish Gupta Manish Gupta. Hershey PA : IGI Global, 2012. pp. 148-167
@inbook{12423abb50934eb4a1f0c6dcfc3ffa33,
title = "Starting the Revolution: Implementing an Identity Management Architecture",
abstract = "The chapter argues that an enterprise should develop its own Identity Management Architecture (IdMA)before attempting any Identity Management implementation. It begins with a discussion of the developmentof the Reference IdMA. It also discusses the issues of how to incorporate existing enterprise workflowsand processes and other specific needs of an enterprise into an IdMA. It proposes the incorporationof existing information security controls into the IdMA by the use of chokepoints to monitor identifiedsecurity hotspots. The issues surrounding the privacy of personal data as well as the protection of corporatedata and assets are discussed and it is shown how these issues may be addressed and includedin the Reference IdMA. Finally, there is a discussion of how to include federation with other enterprisesas part of the enterprise's IdMA.",
keywords = "IdMA, Identity management, Reference architecture",
author = "Peter White",
note = "Imported on 12 May 2017 - DigiTool details were: publisher = Hershey PA: Information Science Reference (IGI Global), 2012. editor/s (773b) = Raj Sharman, Sanjukta Das Smith, and Manish Gupta; Issue no. (773s) = 9; Parent title (773t) = Digital Identity and Access Management: Technologies and Frameworks.",
year = "2012",
doi = "10.4018/978-1-61350-498-7.ch009",
language = "English",
isbn = "9781613504987",
pages = "148--167",
editor = "Gupta, {Manish Gupta Manish}",
booktitle = "Digital Identity and Access Management",
publisher = "IGI Global",
address = "United States",

}

White, P 2012, Starting the Revolution: Implementing an Identity Management Architecture. in MGM Gupta (ed.), Digital Identity and Access Management: Technologies and Frameworks. IGI Global, Hershey PA, pp. 148-167. https://doi.org/10.4018/978-1-61350-498-7.ch009

Starting the Revolution : Implementing an Identity Management Architecture. / White, Peter.

Digital Identity and Access Management: Technologies and Frameworks. ed. / Manish Gupta Manish Gupta. Hershey PA : IGI Global, 2012. p. 148-167.

Research output: Book chapter/Published conference paperChapter (peer-reviewed)

TY - CHAP

T1 - Starting the Revolution

T2 - Implementing an Identity Management Architecture

AU - White, Peter

N1 - Imported on 12 May 2017 - DigiTool details were: publisher = Hershey PA: Information Science Reference (IGI Global), 2012. editor/s (773b) = Raj Sharman, Sanjukta Das Smith, and Manish Gupta; Issue no. (773s) = 9; Parent title (773t) = Digital Identity and Access Management: Technologies and Frameworks.

PY - 2012

Y1 - 2012

N2 - The chapter argues that an enterprise should develop its own Identity Management Architecture (IdMA)before attempting any Identity Management implementation. It begins with a discussion of the developmentof the Reference IdMA. It also discusses the issues of how to incorporate existing enterprise workflowsand processes and other specific needs of an enterprise into an IdMA. It proposes the incorporationof existing information security controls into the IdMA by the use of chokepoints to monitor identifiedsecurity hotspots. The issues surrounding the privacy of personal data as well as the protection of corporatedata and assets are discussed and it is shown how these issues may be addressed and includedin the Reference IdMA. Finally, there is a discussion of how to include federation with other enterprisesas part of the enterprise's IdMA.

AB - The chapter argues that an enterprise should develop its own Identity Management Architecture (IdMA)before attempting any Identity Management implementation. It begins with a discussion of the developmentof the Reference IdMA. It also discusses the issues of how to incorporate existing enterprise workflowsand processes and other specific needs of an enterprise into an IdMA. It proposes the incorporationof existing information security controls into the IdMA by the use of chokepoints to monitor identifiedsecurity hotspots. The issues surrounding the privacy of personal data as well as the protection of corporatedata and assets are discussed and it is shown how these issues may be addressed and includedin the Reference IdMA. Finally, there is a discussion of how to include federation with other enterprisesas part of the enterprise's IdMA.

KW - IdMA

KW - Identity management

KW - Reference architecture

U2 - 10.4018/978-1-61350-498-7.ch009

DO - 10.4018/978-1-61350-498-7.ch009

M3 - Chapter (peer-reviewed)

SN - 9781613504987

SP - 148

EP - 167

BT - Digital Identity and Access Management

A2 - Gupta, Manish Gupta Manish

PB - IGI Global

CY - Hershey PA

ER -

White P. Starting the Revolution: Implementing an Identity Management Architecture. In Gupta MGM, editor, Digital Identity and Access Management: Technologies and Frameworks. Hershey PA: IGI Global. 2012. p. 148-167 https://doi.org/10.4018/978-1-61350-498-7.ch009