Identity and Access Management: Business Performance Through Connected Intelligenceprovides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.
Focuses on real-word implementations
Provides end-to-end coverage of IAM from business drivers, requirements, design, and development to implementation
Presents a proven, step-by-step method for deploying IAM that has been successfully used in over 200 cases
Includes companion website with source code examples in Java, XML, and SPML as well as reusable templates