Developing an identity mapping plan

 

A critical part of the initial Enterprise Identity Mapping (EIM) implementation planning process requires that you determine how you want to use identity mapping in your enterprise.

There are two methods that you can use to map identities in EIM:

You may decide to use identifier associations to provide the best control of the user identities in your enterprise while gaining the largest degree of streamlined password management. Or, you may decide to use a mixture of policy associations and identifier associations to streamline single signon, where appropriate, while you maintain specific control over user identities for administrators. Regardless of what type of identity mapping you decide best meets your business needs and properly fits your security policy, create an identity mapping plan to ensure that you implement identity mapping appropriately.

To create an identity mapping plan, do the following:

 

Parent topic:

Planning Enterprise Identity Mapping for eServer

 

Related concepts


Creating EIM associations