Simplifying Identity and Access Management
Simplifying identity and access management Several approaches or strategies exist to address these challenges. The security framework approach implements a framework around the entire environment, imposing structure on the disparate identity infrastructure.The point solution approach addresses individual cases as they occur, devising solutions and implementing technologies designed to solve the specific problem. The drawback here is that the solution usually fits the specific system for which it is designed, while a similar problem in another system would require an additional solution. Custom development is another option. With enough time and effort, custom-developed solutions will integrate any components. Standards exist and tools are available to enable an organization to integrate its Unix systems with Active Directory. However, on the down side, these projects usually prove too complex, time-consuming and expensive to be viable for a large, complex organization. Relying on the status quo is the reality for which many organizations opt when faced with identity and access management challenges. They make do with what they have, perhaps in combination with point solutions and custom-developed solutions.
Often called meta-directories or virtual directories, these security frameworks implement a master directory to which all other directories are synchronized. Among the drawbacks to the security framework, however, is its inability to unify each identity in a heterogeneous environment.