{"id":34,"date":"2003-12-19T00:00:00","date_gmt":"2003-12-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/19\/early-lessons-of-identity-management-implementations\/"},"modified":"2021-12-30T11:36:20","modified_gmt":"2021-12-30T11:36:20","slug":"early-lessons-of-identity-management-implementations","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/19\/early-lessons-of-identity-management-implementations\/","title":{"rendered":"Early Lessons of Identity Management Implementations"},"content":{"rendered":"<p>[b]META Trend: [\/b]<br \/>\n[i]Identity management and security needs will cause an increase in enterprise directory services adoption through 2004, as existing federated directories drive more provisioning and directory integration tool use.  <\/p>\n<p>As more IT organizations deploy identity management solutions, some early lessons have been learned about the planning, implementation, and operations of those services. <\/p>\n<p>Enterprise\/extranet directory distinctions will blur through 2005 and beyond, as internal\/external identity needs converge.  Directory use for some application authorization roles will increase as directory functionality expands.  <\/p>\n<p>XML will enable component databases (as next-generation directories) and better integration capability (2006-08).[\/i]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enterprises everywhere have fundamental concerns about the manner in which IT organizations can deliver an identity infrastructure that is both productive and efficient while also being secure.  Compliance drivers (i.e., legal and regulatory) are also becoming increasingly important, as evidenced by recent legislation on all continents.  These factors have combined to drive significant decision making among IT infrastructure planners regarding how best to manage the identity asset currently in use in the enterprise.<\/p>\n<p>Lessons Learned: Planning for Identity Management <\/p>\n<p>1. Managing Expectations Increases the Likelihood of Successful Implementations<br \/>\n2. Executive Sponsorship Is Not Optional<br \/>\n3. Identity Must Be Defined as a Strategic Asset and Used as the Basis for Planning<br \/>\n4. Identity Management Is Integration Management<br \/>\n5. Nothing Is As Political As identity<br \/>\n6. A Sound Identity Infrastructure Is a Prerequisite to Effective Identity Management Deployment<br \/>\n7. It<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-34","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/34\/revisions"}],"predecessor-version":[{"id":2521,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/34\/revisions\/2521"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=34"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}