You might have missed it as there wasn’t a lot of press, but IBM recently acquired a small startup called Red Hat. As with many IBMers, I have been on a steep learning curve to understand the capabilities this brings. As an interesting exercise, I thought I’d treat the OpenShift stack as an identity project … Continue reading IGA and PAM – Managing Identities in a Red Hat OpenShift Environment
Month: August 2019
SCIM Will Solve All Your IGA Problems, Right?
Continuing my theme of exploring IGA topics and “the Cloud”, I thought it worthwhile looking at SCIM and its adoption since it appeared eight years ago. The System for Cross-domain Identity Management, or SCIM, is the current rockstar of Identity Governance and Administration (IGA). It’s a lightweight data model utilizing JSON and REST that seems to solve … Continue reading SCIM Will Solve All Your IGA Problems, Right?
IGA Cloud or On-Prem – Have You Checked the Plumbing?
A major decision for all software deployments, including Identity Governance and Administration (IGA) deployments, is what platform to deploy to; cloud, on-premise or a hybrid of the two. Many IGA products are available as both cloud-based and on-prem. Some on-prem products can be hosted as SaaS or managed service offerings in the cloud. Some of … Continue reading IGA Cloud or On-Prem – Have You Checked the Plumbing?
How Much Workflow Do You Need for Your IGA Project?
Workflow is a core capability in any Identity Governance and Administration (IGA) deployment; IGA is all about automating the business processes around managing and governing users and their access. IGA deployments often take much longer than anticipated and don’t achieve all of what the project set out to do. Why? There are many factors, but … Continue reading How Much Workflow Do You Need for Your IGA Project?
IGDM Part 3 – Implementing the Identity Governance Data Model
This article is the third in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This third article suggests an implementation of the module using a SCIM-like approach. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) … Continue reading IGDM Part 3 – Implementing the Identity Governance Data Model
IGDM Part 2 – Validating the Proposed Identity Governance Data Model
This article is the second in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This second article validates the model against some common complex applications. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The … Continue reading IGDM Part 2 – Validating the Proposed Identity Governance Data Model
IGDM Part 1 – Proposing an Identity Governance Data Model
This article is the first in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This first article proposes the model. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The proposed IGDM is designed to … Continue reading IGDM Part 1 – Proposing an Identity Governance Data Model

IAMSE