The chapter argues that an enterprise should develop its own Identity Management Architecture (IdMA)before attempting any Identity Management implementation. It begins with a discussion of the developmentof the Reference IdMA. It also discusses the issues of how to incorporate existing enterprise workflowsand processes and other specific needs of an enterprise into an IdMA. It proposes the incorporationof existing information security controls into the IdMA by the use of chokepoints to monitor identifiedsecurity hotspots. The issues surrounding the privacy of personal data as well as the protection of corporatedata and assets are discussed and it is shown how these issues may be addressed and includedin the Reference IdMA. Finally, there is a discussion of how to include federation with other enterprisesas part of the enterprise's IdMA.
|Title of host publication||Digital identity and access management|
|Subtitle of host publication||Technologies and frameworks|
|Editors||Manish Gupta Manish Gupta|
|Place of Publication||Hershey PA|
|Publisher||Information Science Reference|
|Number of pages||20|
|Publication status||Published - 2012|