Managing Enterprise Identity Mapping identifiers
Use this information to learn how to create and manage Enterprise Identity Mapping (EIM) identifiers for a domain.
Creating and using EIM identifiers that represent the users in your network can be very useful for helping you track which person owns a particular user identity. Users within the enterprise are nearly always changing, with some coming, some going, and others moving between areas. These changes add to the ongoing administrative problem of keeping track of users' identities and passwords for systems and applications in the network. Additionally, password management takes a large amount of time in an enterprise. By creating Enterprise Identity Mapping (EIM) identifiers and associating them with the user identities for each user, you can make the process of tracking who owns a particular user identity. Doing so can also make password management much easier.
Implementing a single signon environment makes the process of managing user identities easier for users as well , especially when they move to another department or area within the enterprise. Single signon enablement can eliminate the need for these users to remember new user names and passwords for new systems.
How you create and use EIM identifiers depends on the needs of your organization. To learn more, see Developing an EIM identifier naming plan.
You can manage EIM identifiers for any EIM domain that is available under the Domain Management folder. You can perform any of the following tasks to manage the EIM identifiers in an EIM domain:
- Creating an EIM identifier
To create an EIM identifier, be connected to the Enterprise Identity Mapping (EIM) domain in which you want to work and have EIM access control as either Identifier administrator or EIM administrator.
- Adding an alias to an EIM identifier
You may want to create an alias to provide additional distinguishing information for an EIM identifier. Aliases can aid in locating a specific Enterprise Identity Mapping (EIM) identifier when performing an EIM lookup operation. For example, aliases can be useful in situations where someone's legal name is different from the name that person is known as.
- Removing an alias from an EIM identifier
To remove an alias from an Enterprise Identity Mapping (EIM) identifier, be connected to the EIM domain in which you want to work and have EIM access control as either Identifier administrator or EIM administrator.
- Deleting an EIM identifier
To delete an EIM identifier, be connected to the Enterprise Identity Mapping (EIM) domain in which you want to work and have EIM administrator access control.
- Customizing the EIM identifiers view
Sometimes when you attempt to expand the Identifiers folder, it may take a long time before the list of identifiers displays. To improve performance when you have a large number of Enterprise Identity Mapping (EIM) identifiers in the domain, you can customize the view for the Identifiers folder.
Parent topic:
Managing Enterprise Identity Mapping