
Identity and Access Management: Business Performance Through Connected Intelligence
Osmanoglu, T.Ertem
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML. Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirements, design, and development to implementationPresents a proven, step-by-step method for deploying IAM that has been successfully used in over 200 casesIncludes companion website with source code examples in Java, XML, and SPML as well as reusable templates INDICE: SECTION 1 - Business Case and Current State Chapter 1 - IAM Framework, Key Principles and Definitions Chapter 2 - Business Requirements Chapter 3 - Business Case Development Chapter 4 - Current State and Capability Maturity Chapter 5 - Key Challenges and Critical Success Factors Chapter 6 - Case Studies SECTION 2 - Future State and IAM Roadmap Chapter 7 - Future State Definition Chapter 8 - IAM Roadmap and Strategy Chapter 9 - A Risk Based Approach to IAM Chapter 10 - A Service Based Approach to IAM (Cloud / Managed Service) Chapter 11 - IAM for End-user Computing Devices Chapter 12 - Case Study SECTION 3 - Implementation Chapter 13 - Implementation Methodology and Approach Chapter 14 - IAM Services Chapter 15 - Identity Definition and On-boarding Chapter 16 - Access Request and Approval Chapter 17 - Provisioning and De-provisioning Chapter 18 - Enforcement Chapter 19 - Access Review and Certification Chapter 20 - Reporting and Monitoring Chapter 21 - Roles and Rules Chapter 22 - IAM Product Selection Chapter 23 - Implementation Case Studies
- ISBN: 978-0-12-408140-6
- Editorial: Syngress
- Encuadernacion: Rústica
- Páginas: 464
- Fecha Publicación: 03/01/2014
- Nº Volúmenes: 1
- Idioma: Inglés