Identity and Access Management

1st Edition

Business Performance Through Connected Intelligence


  • Ertem Osmanoglu
  • Description

    Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.

    Key Features

    • Focuses on real-word implementations
    • Provides end-to-end coverage of IAM from business drivers, requirements, design, and development to implementation
    • Presents a proven, step-by-step method for deploying IAM that has been successfully used in over 200 cases
    • Includes companion website with source code examples in Java, XML, and SPML as well as reusable templates


    Chief Information Security Officers (CISOs), Directors of Information Security, information security consultants, Security Systems Architects, SAML developers, and Security Managers

    Table of Contents

    SECTION 1 – Business Case and Current State

    Chapter 1 - IAM Framework, Key Principles and Definitions

    Chapter 2 – Business Requirements

    Chapter 3 – Business Case Development

    Chapter 4 – Current State and Capability Maturity

    Chapter 5 – Key Challenges and Critical Success Factors

    Chapter 6 – Case Studies

    SECTION 2 – Future State and IAM Roadmap

    Chapter 7 – Future State Definition

    Chapter 8 – IAM Roadmap and Strategy

    Chapter 9 – A Risk Based Approach to IAM

    Chapter 10 – A Service Based Approach to IAM (Cloud / Managed Service)

    Chapter 11 – IAM for End-user Computing Devices

    Chapter 12 – Case Study

    SECTION 3 – Implementation

    Chapter 13 – Implementation Methodology and Approach

    Chapter 14 – IAM Services

    Chapter 15 – Identity Definition and On-boarding

    Chapter 16 – Access Request and Approval

    Chapter 17 – Provisioning and De-provisioning

    Chapter 18 – Enforcement

    Chapter 19 – Access Review and Certification

    Chapter 20 – Reporting and Monitoring

    Chapter 21 – Roles and Rules

    Chapter 22 – IAM Product Selection

    Chapter 23 – Implementation Case Studies


    No. of pages:
    © 2014
    Print ISBN:
    Electronic ISBN:

    About the author

    Ertem Osmanoglu

    Ertem Osmanoglu is a Partner and Principal in the Information Technology Advisory Services practice at Ernst & Young's Financial Services Office. He leads the Identity and Access Management practice within Ernst & Young’s Financial Services Office. He has led teams for large global clients with information security, identity and access management, e-business strategy, IT risk management and infrastructure service needs. He has over 18 years experience in the IT field and is the author of Security Architecture: Design, Deployment and Operations (McGraw-Hill 2001).