Identity Management System - Electronic Identity Management

Electronic Identity Management

In general, electronic IdM can be said to cover the management of any form of digital identities. The focus on identity management goes back to the development of directories, such as X.500, where a namespace serves to hold named objects that represent real-life "identified" entities, such as countries, organizations, applications, subscribers or devices. The X.509 ITU-T standard defined certificates carried identity attributes as two directory names: the certificate subject and the certificate issuer. X.509 certificates and PKI systems operate to prove the online "identity" of a subject. Therefore, in IT terms, one can consider identity management as the management of information (as held in a directory) that represents items identified in real life (e.g. users, organizations, devices, services, etc.). The design of such systems requires explicit information and identity engineering tasks.

The evolution of identity management follows the progression of Internet technology closely. In the environment of static web pages and static portals of the early 1990s, corporations investigated the delivery of informative web content such as the "white pages" of employees. Subsequently, as the information changed (due to employee turnover, provisioning and de-provisioning), the ability to perform self-service and help-desk updates more efficiently morphed into what became known as Identity Management today.

Typical identity management functionality includes the following:

  • Access control
  • Cloud computing
  • Digital identity management
  • Password manager
  • Workflow automation
  • Provisioning
  • Single sign-on
  • Security Token Service
  • Role based access control
  • Risk management

Identity management also addresses the age-old 'N+1' problem — where every new application may entail the setting up of new data stores of users. The ability to centrally manage the provisioning and de-provisioning of identities, and consolidate the proliferation of identity stores, all form part of the identity management process.

Read more about this topic:  Identity Management System

Famous quotes containing the words electronic, identity and/or management:

    The car as we know it is on the way out. To a large extent, I deplore its passing, for as a basically old- fashioned machine, it enshrines a basically old-fashioned idea: freedom. In terms of pollution, noise and human life, the price of that freedom may be high, but perhaps the car, by the very muddle and confusion it causes, may be holding back the remorseless spread of the regimented, electronic society.
    —J.G. (James Graham)

    The “female culture” has shifted more rapidly than the “male culture”; the image of the go-get ‘em woman has yet to be fully matched by the image of the let’s take-care-of-the-kids- together man. More important, over the last thirty years, men’s underlying feelings about taking responsibility at home have changed much less than women’s feelings have changed about forging some kind of identity at work.
    Arlie Hochschild (20th century)

    This we take it is the grand characteristic of our age. By our skill in Mechanism, it has come to pass, that in the management of external things we excel all other ages; while in whatever respects the pure moral nature, in true dignity of soul and character, we are perhaps inferior to most civilised ages.
    Thomas Carlyle (1795–1881)