Identity Management System - Electronic Identity Management

Electronic Identity Management

In general, electronic IdM can be said to cover the management of any form of digital identities. The focus on identity management goes back to the development of directories, such as X.500, where a namespace serves to hold named objects that represent real-life "identified" entities, such as countries, organizations, applications, subscribers or devices. The X.509 ITU-T standard defined certificates carried identity attributes as two directory names: the certificate subject and the certificate issuer. X.509 certificates and PKI systems operate to prove the online "identity" of a subject. Therefore, in IT terms, one can consider identity management as the management of information (as held in a directory) that represents items identified in real life (e.g. users, organizations, devices, services, etc.). The design of such systems requires explicit information and identity engineering tasks.

The evolution of identity management follows the progression of Internet technology closely. In the environment of static web pages and static portals of the early 1990s, corporations investigated the delivery of informative web content such as the "white pages" of employees. Subsequently, as the information changed (due to employee turnover, provisioning and de-provisioning), the ability to perform self-service and help-desk updates more efficiently morphed into what became known as Identity Management today.

Typical identity management functionality includes the following:

  • Access control
  • Cloud computing
  • Digital identity management
  • Password manager
  • Workflow automation
  • Provisioning
  • Single sign-on
  • Security Token Service
  • Role based access control
  • Risk management

Identity management also addresses the age-old 'N+1' problem — where every new application may entail the setting up of new data stores of users. The ability to centrally manage the provisioning and de-provisioning of identities, and consolidate the proliferation of identity stores, all form part of the identity management process.

Read more about this topic:  Identity Management System

Famous quotes containing the words electronic, identity and/or management:

    Sometimes, because of its immediacy, television produces a kind of electronic parable. Berlin, for instance, on the day the Wall was opened. Rostropovich was playing his cello by the Wall that no longer cast a shadow, and a million East Berliners were thronging to the West to shop with an allowance given them by West German banks! At that moment the whole world saw how materialism had lost its awesome historic power and become a shopping list.
    John Berger (b. 1926)

    I look for the new Teacher that shall follow so far those shining laws that he shall see them come full circle; shall see their rounding complete grace; shall see the world to be the mirror of the soul; shall see the identity of the law of gravitation with purity of the heart; and shall show that the Ought, that Duty, is one thing with Science, with Beauty, and with Joy.
    Ralph Waldo Emerson (1803–1882)

    No officer should be required or permitted to take part in the management of political organizations, caucuses, conventions, or election campaigns. Their right to vote and to express their views on public questions, either orally or through the press, is not denied, provided it does not interfere with the discharge of their official duties. No assessment for political purposes on officers or subordinates should be allowed.
    Rutherford Birchard Hayes (1822–1893)