O'Reilly logo

Identity and Access Management by Ertem Osmanoglu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Common Challenges and Key Considerations

Nicholas Gazos

A well-defined and implemented identity and access management (IAM) program reduces risk, enhances compliance, and improves operational inefficiency. However, implementing and maintaining an effective IAM program also has inherent challenges. This chapter will examine common IAM challenges and considerations in support of planning and implementation efforts and serve as a reference guide for lessons learned.

Keywords

Identity and access management (IAM); segregation of duties (SoD); federation; entitlement; profile; authentication; authorization; role; glossary; service level agreement (SLA)

A well-defined and implemented identity and access management (IAM) program offers many ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required