IdM provides a significantly greater opportunity to an online business beyond the process of authenticating and authorizing users via cards, tokens and web access control systems.
User-based IdM is evolving from username/password and web access control systems to those that embrace preferences, parental controls, entitlements, policy-based routing, presence and loyalty schemes.
IdM provides the focus to deal with system-wide data quality and integrity issues often encountered by fragmented databases and workflow processes.
IdM embraces what the user actually gets in terms of products and services and how and when they do that. Therefore IdM applies to the products and services of an organization such as health, media, insurance, travel or government services, as well as how these products are provisioned and assigned to (or removed from) "entitled" users.
IdM can deliver a single customer view that includes their presence and location, single product and services and single IT infrastructure and network views to the respective parties and therefore IdM is related intrinsically to information engineering and information security and privacy.
IdM covers the machinery (system infrastructure components) that delivers such services because a user's service could be assigned to: a particular network technology; content title; usage rights; media server; mail server; soft switch; voice mail box; product catalogue set; security domain; billing system; CRM or help desk and so on.
Critical to IdM projects are considerations of the online services of an organization (what are the users logging on to) and how are they managed from an internal perspective and the customer self care perspective.
No comments:
Post a Comment