Access management - IBM Security Identity Manager
In a security lifecycle, IBM Security Identity Manager and several other products provide access management. You can determine who can enter your protected systems. You can also determine what can they access, and ensure that users access only what they need for their business tasks.
Access management addresses three questions from the business point of view:
- Who can come into my systems?
- What can they do?
- Can I easily prove what they did with that access?
These products validate the authenticity of all users with access to resources, and ensure that access controls are in place and consistently enforced:
ISIM provides a secure, automated, and policy-based user management solution to manage user identities throughout their lifecycle across both legacy and e-business environments. ISIM provides centralized user access to disparate resources in an organization, with policies and features that streamline operations associated with user-resource access.
Benefits:
- Users can self-administer their passwords.
- Password synchronization enables a user to use one password for all accounts that ISIM manages
- Quick response to audits and regulatory mandates
- Automation of business processes related to changes in user identities (lifecycle management)
- Centralized control and local autonomy
- Enhanced integration with the use of extensive APIs
- Choices to manage target systems either with an agent or agentless approach
- Reduced help desk costs
- Increased access security through the reduction of orphaned accounts
- Reduced administrative costs through the provisioning of users with software automation
- Reduced costs and delays associated with approving resource access to new and changed users
For more information about how access management products fit in larger solutions for a security lifecycle, see the IBM Security Management website: http://www.ibm.com/security/
IBM Redbooks and Redpapers also describe implementing IBM Security Identity Manager within a portfolio of IBM security products.
Parent topic: Features overview