Skip to main content
Log in

Overcoming the challenges in deploying user provisioning/identity access management backbone

  • Published:
BT Technology Journal

Abstract

This paper sets out to share BT's leadership and experience by determining the identity management opportunities and issues, then document the lessons learnt in previous deployments and recommend strategies for all types and sizes of organisation.

Today's ICT environment has created a mixed approach to access management across sectors. Browser-based any time, anywhere, anyone access, coupled with the business need to access more systems and services across a changing infrastructure of distributed platforms and networked services, has changed the administrative landscape. Enterprises are being forced to add administrative support staff or invest in technology-driven process change. At the same time, users are undergoing significant change, creating new expectations in service quality. Moreover, regulatory bodies are demanding confirmation that processes granting access are controlled and documented. In this world of increasing demands, complexity and expectation, the service management tools, techniques and options available to improve user access management are as varied and numerous as the issues faced by management in their deployment.

Identity management is widely heralded as an opportunity to improve the end user experience, reduce costs, improve security and deliver regulatory compliance — but is often misunderstood. Projects regularly fail to achieve the expected benefits. These failures are the result of expectations being inappropriately set, deployment of solutions turning out to be more complex or taking longer than expected, and/or products selected before required functionality has been determined.

For the larger more mature organisations, or those organisations that are the amalgamation of mergers and acquisitions, the dilemma is where to start and what approach to take.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Giga Information Group (now Forrester) — http://www.forrester.com/

  2. Wahl M et al: ‘Lightweight Directory Access Protocol (v3)’, IETF RFC2251 — http: //www.ietf.org/rfc/

Download references

Authors

About this article

Cite this article

Becker, M., Drew, M. Overcoming the challenges in deploying user provisioning/identity access management backbone. BT Technol J 23, 71–79 (2005). https://doi.org/10.1007/s10550-006-0009-x

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10550-006-0009-x

Keywords

Navigation