I’ve talked before about identity strategy (and here), but what does a whole lifecycle of an enterprise identity deployment look like? In other words, what is a master plan for implementing identity management? Let’s assume that there are three stages:
1. Establish core infrastructure
- Conduct strategy / assessment / planning
- Build out identity vault
- Connect primary identity repositories (i.e., file & print, HR, etc.)
2. Provision key systems
- Connect key systems (defined as financially significant and business critical)
- Deploy basic provisioning and workflow
3. Enhance
- Add additional systems, including disconnected systems
- Enhance provisioning and workflow
- Introduce role based access control
- Other — e.g., rapid login/logoff for clinicians
[…] readers will recall my tour through enterprise identity management deployments (overview here). This approach includes doing an upfront identity strategy (and here) followed by three stages of […]