Building an identity strategy in three stages

I’ve talked before about identity strategy (and here), but what does a whole lifecycle of an enterprise identity deployment look like? In other words, what is a master plan for implementing identity management? Let’s assume that there are three stages:

1. Establish core infrastructure

  • Conduct strategy / assessment / planning
  • Build out identity vault
  • Connect primary identity repositories (i.e., file & print, HR, etc.)

2. Provision key systems

  • Connect key systems (defined as financially significant and business critical)
  • Deploy basic provisioning and workflow

3. Enhance

  • Add additional systems, including disconnected systems
  • Enhance provisioning and workflow
  • Introduce role based access control
  • Other — e.g., rapid login/logoff for clinicians

One thought on “Building an identity strategy in three stages

Comments are closed.