Authentication of the user the Organization assessed the suitability of IT according to the degree of support of business processes as well as the ease of use by the employee. A high Komplexitat, much technical overhead”in the preparation and use of APpLiCAtion and a low adaptability counter. The demands of the Executive and the legislature are indeed in principle system independent; they are satisfied, but only if they are implemented equally across all applications and systems. If for example, but the ease of use on the part of the user suffers from complex password requirements, post-its with the password at the keyboard this measure can thoroughly fail. There are several proposal in the IdM that help to meet this requirement.
IdM offers standard interfaces for the synchronization of password information between different systems (SIMPLE sign on). This defines a system that provides the authentication information (password, certificate). The IdM solution takes this information and distributes it to other systems. In addition, standard interfaces allow the secure synchronization of the identification information with a central SINGLE-sign-on solution. Such a solution used, it provides the authentication information for all other systems. Centralized identity management a central responsibility for IdM and authorization (IAM) contributes, that the diverse requirements of IT can be implemented in a manageable and comprehensible.
One is the biggest challenge in the implementation of technical tools, but in the design of the organizational principles and practices for IdM. IdM solution is best if it is implemented for all systems and applications in the same way with native processes in one central solution. 7 Point check identity management test you the maturity level of identity management in your organization: processes for the investment, design and management roles are defined. Processes for the allocation and withdrawal of roles are defined. Processes for the operation of a role model are defined. There are reliable sources for employee master data. The assignment of permissions is organized, so that Automation is possible. There is a role model for all departments, which limits individual solutions. 80% of the permissions can assign themselves without technical knowledge within 24 hours. Group who directly group directly to include with the networks directly Gesellschaft fur Informationstechnologie mbH, the solutions directly for solution development mbH and the marketing solutions directly Gesellschaft fur innovative marketing mbH three companies. The group is for medium-sized and large companies active throughout Germany. In addition to banks and insurance companies, especially companies with high penetration of IT among the customers. The group directly advises, implements and operates complex IT infrastructures, and supports its customers in the field of marketing and communication. See for more information: networks directly Gesellschaft fur Informationstechnologie mbH marketing and communication Kerstin Lausen Grieg Street 75 22763 Hamburg Tel.: + 49 (0) 40 88155-282 fax: + 49 (0) 40 88155-5200 E-Mail: