Topic Features Benefits
Password Management
  • Password synchronization across managed systems
  • Strengthened password security
  • Central policy administration to control composition, password generation, etc.
  • Password aging and reset
  • Allows users to maintain a single password across all systems, which reduces the need to remember multiple passwords.
  • Improves end user productivity by reducing the number of passwords to remember
 Self Service
  • Self Service enables end users to manage their profiles and passwords
  • White pages functionality
  • “Forgot password” functionality”
  • Improves end user productivity
  • Reduces help desk volume
  • Identity life cycle management
  • Automatic provisioning
  • GUI based workflow modeling
  • Request / Approval functionality
  • SPML 2 compliant connectors
  • Automatic provisioning, re-provisioning, and de-provisioning of users and resources
  • Improves security by ensuring access is granted and removed as needed
  • Improved end user productivity
  • Reduces operational cost.
 Role Management
  • Role lifecycle management
  • Requests, approval process to define new roles and update existing roles
  • GUI based workflow process definitions for approval processes
  • Role lifecycle reporting
  • Periodic review and adaptation of role model to business needs
  • Request, review, approval, and assignment of users to roles
  • Integration of job Roles with identity lifecycle improves alignment between business and IT
  • Improves compliance and enforcement of IT controls.
  • Reduces cost of audits
  • Auditor Policy to confirm that IT Roles are provisioned correctly
Entitlement Management
  • Automatic provisioning fine grained entitlements across managed systems
  • Leverages provisioning and role management components
  • Improves compliance by providing necessary access to data in audits
  • Ensure the access is granted to only appropriate users.
Audit and Compliance
  • Fine grained audit control across architecture
  • Provides comprehensive framework for establishing access control compliance
  • Reduced costs for provisioning and identity auditing
  • Automated reviews and proactive scanning, consistent enforcement and repeatable processes
  • Enables synchronization between a source system and the target systems that are managed by the identity manager
  •  Detects changes in the target system and synchronizes them with the other target systems. Also detects orphans.
Delegated Administration
  •  Allows the administrator to delegate certain rights to other users based on a set of rules.