Comprehensive Identity Management Solutions
The IDM platform is one of the best practices for implementing identity management. It extends identity and permission management to various types of users and application systems, including in-house apps, mobile apps, and SaaS tools, without compromising security. It bridges information silos and creates an identity-based security governance system. This approach unifies risk control and compliance auditing for various user behaviors (employees, teachers, students, parents, contractors, partners, etc.) and facilitates the automatic creation and revocation of all user identities, which significantly improving efficiency. Automated identity information process management can enhance process efficiency and automate the control of account permissions, preventing security loopholes due to human errors.
Challenges of identity management
IDM System logic diagram.
Support on all kinds of source
The IDM platform supports various identity sources. Administrators only need to configure the connection information and mapping relationships of the identity properties to pull upstream identity data in real time, forming a data link from the identity source to the authoritative data source. The IDM platform primarily supports the following types of identity sources:
- 1
Directory Identity Source
- 2
HR Systems
- 3
OA Systems
- 4
Other Systems
Support on identity management on target applications
The IDM platform supports integrating identity information for various applications, including AD, Azure, M365 Graph, WeCom, DingTalk, Hikvision, and other common applications. Characteristics of target application system pushes include:
Automated Identity Information Lifecycle Management
The IDM platform is one of the best practices for implementing identity management. It extends identity and permission management to various types of users and application systems, including in-house apps, mobile apps, and SaaS tools, without compromising security. It bridges information silos and creates an identity-based security governance system. This approach unifies risk control and compliance auditing for various user behaviors (employees, teachers, students, parents, contractors, partners, etc.) and facilitates the automatic creation and revocation of all user identities, which significantly improving efficiency. Automated identity information process management can enhance process efficiency and automate the control of account permissions, preventing security loopholes due to human errors.
Data transformation and standardization
IDM provides data transformation and mapping, standardizing data by connecting upstream and downstream data sources. Key functions include:
1) IDM Identity Source Standardization
Standardizes transformed data sources, creating an IT systemic authoritative source to meet the subsequent needs of business systems. As an intermediary platform, IDM can fulfill the identity information transfer and conversion needs between upstream and downstream systems, ensuring both the standardization and convenient use of identity information.
2) Application System Data Customization
Application systems can map identity attributes according to their own needs. Third-party applications can also return data to IDM or HR systems. Flow of data between processes can be limited with various mappings.