Identity Management, Single-Sign-On and Role Management

Identity and access management systems are the most important tools that enable implementation of application security policies. Apart from security and compliance, these solutions also offer important functions in operational efficiency and productivity.

Since applications enable users to have structural access to and process raw data and carry out organizational processes, accessing them without control constitutes a security gap for organizations. Therefore, it should be managed who, why, how and when to access which application. Organizations that see security gaps arising from application access as a threat desire to create policies countering these gaps and use measures implementing these policies. Identity and access management solutions step in at this stage.

Basically, the benefits of Identity Management Systems are as follows:

  • Automatic and quick account creation with records received from systems such as Human Resources (HR)
  • Automatic, timely and quick account cancellation
  • Definition of multiple accounts for a person
  • Forgotten password and password reset processes,
  • Cancelling accounts of departed personnel promptly (e-mail, domain, core system accounts),
  • Elimination of reporting problems about who can access which system with which authorization,
  • Increased data quality,
  • Increased speed of control processes (both in terms of frequency and control time),
  • Making account and password policies available across all units and systems,
  • Granting and monitoring authorizations in a more controlled manner with request-approval work flows,
  • Exercising the rules of Segregation of Duties (SoD),
  • Ensuring that passwords are not known by administrators and are received by the right person at reset stage.
  • Detecting unauthorized accounts and roles,
  • Preventing authorizations from being granted inadvertently,
  • Synchronizing Active Directory password with desired systems when changed
  • Informing account holders and managers instantly when accounts are opened or closed, passwords are changed, or critical authorizations are granted.

Full automatic operation and capabilities of Identity and Access Management systems actually depend on their role-based operation. In this sense, Role Management is crucial. The systems managing the lifecycle of roles is called as Role Management systems. In this context, Identity, Access and Role Management systems complement and feed each other.

Our partners in the field