The article discusses the problems on a common enterprise that does not have an Identity and Access Management system and describes the benefits which the implementation an IAM system can provide. The main components are listed and the technologies used in IAM systems are described. Effectivity of using an IAM system at the enterprise and the first steps for its implementation are analyzed. Questions that need to be answered before choosing a particular Identity and Access Management system are listed. The aim of this work is to find a solution that will eliminate the problems described in the article, and especially to optimize the employee accounting process, increase password security, and make it easier to grant access to the corporate resources. The choice of IAM solutions on the market is quite diverse. There are solutions that can be installed on company servers, as well as solutions that can be rented as cloud service (Identity as a Service). You can also build your own IAM system using open-source solutions or developing proprietary software. There are many articles in the Internet describing what Identity and Access Management is and why it is so important to use it. But these articles do not include any practical steps or specific recommendations which IAM system to choose. This article focuses on the practical side of the issue. The implementation an IAM system will accelerate the provision access to the enterprise resources for new employees, increase the security of existing information systems, and simplify the procedure for employees to log in the corporate resources before starting to work with them. Despite the difficulties related with the implementation of IAM systems and the fact that the implementation process can take a long time, the benefits of the result will compensate for all the resources spent on implementation.
Read full abstract