• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance

Active Directory

Manage identity in Active Directory

Azure (O365)

Manage identity in Office365

SAP

Manage identity in SAP S/4 Hana

SAP SuccessFactors

Manage identity in SAP SuccessFactors

Workday

Manage identity in Workday

Education

Manage identity for students, staff and alumni

User Access Requests

Empower end users and improve compliance with user access requests

Strong Authentication

Improve security with adaptive authentication and MFA

Single Sign-On (SSO)

Improve customer experience with SSO

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

  • Partners

Current Partners

Our Current Partners

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

What is Reconciliation?

Identity and Access Management (IAM) systems have become integral in today's digital organizations. However, with the diverse applications, platforms, and systems in play, managing identities consistently can be a challenge. This is where the concept of "identity reconciliation" comes into the picture.

Identity reconciliation refers to the process of ensuring that identity data across multiple systems is consistent, accurate, and up to date. It's about comparing different sources of identity data, identifying discrepancies, and then resolving any inconsistencies. This process is essential for organizations that use multiple systems, each holding potentially different data about the same user.

Why is identity reconciliation important?

  • Data integrity: With users often registered on multiple systems - from HR databases to email platforms - it's easy for inconsistencies to arise. Over time, as employees change roles, leave, or new software is introduced, the risk of data discrepancies grows. Identity reconciliation helps maintain the accuracy and integrity of user data across platforms.
  • Security: Inaccurate identity data can lead to security vulnerabilities.  If an employee switches to a new job in the company, they might still be able to access an account in a target system meant for their previous role, which they should no longer have access to. By reconciling identities, such risks are minimized.
  • Efficiency: Manually sifting through user data across multiple systems is tedious and error-prone. Automated identity reconciliation can streamline this process, saving time and reducing errors.

Types of reconciliation

OpenIAM is an Identity and Access Management (IAM) solution that addresses the challenges of identity reconciliation. In the context of IAM, reconciliation typically refers to the process of ensuring data consistency between a source (like an HR system) and target systems (like email, CRM, etc.). The types of reconciliation processes in OpenIAM platforms usually revolve around the following: 

  • Full reconciliation: This involves comparing all the identity records from the source system with those in the target systems to identify any differences. It's a comprehensive process that ensures that all records, regardless of when they were last updated, are consistent across systems. 
  • Incremental reconciliation: Instead of comparing all records, incremental reconciliation focuses only on the records that have changed since the last reconciliation. This is more efficient than full reconciliation, especially in large organizations where the volume of identity data is huge, but it assumes that no discrepancies have arisen outside of the known changes. 
  • Event-driven reconciliation: This type of reconciliation is initiated based on specific events or triggers. For instance, when an employee changes departments, it might trigger a reconciliation process to ensure that their access permissions are updated accordingly across all systems. 
  • Scheduled reconciliation: Many organizations schedule regular, full or incremental reconciliation processes to run at specific times. This could be, for example, at the end of each day, week, or month. 
  • Real-time reconciliation: As the name suggests, real-time reconciliation processes are initiated immediately upon detecting a change. They ensure that any updates to identity data are immediately reflected across all connected systems.
  • Manual reconciliation: Sometimes, automated reconciliation processes might not address all discrepancies, especially if they're complex or involve systems that aren't fully integrated with the IAM platform. In such cases, manual reconciliation, where administrators manually compare and update records, might be necessary.

Reconciliation data flow

Reconciliation in the context of Identity and Access Management (IAM) is about ensuring that identity data is consistent across various systems. The data flow for reconciliation typically involves multiple steps and interactions between source and target systems. Here's a general overview of how reconciliation data flow might work:

  1. Source data retrieval:
    • The process starts by accessing the source system (e.g., an HR system) to retrieve the most recent identity data. This data might include user details, roles, and associated privileges.
  2. Target data retrieval:
    • The IAM system then connects to each target system (e.g., email, CRM, cloud applications) to retrieve the current identity data stored there.
  3. Comparison:
    • The IAM system compares the identity data from the source system with the data from each target system. It checks for any discrepancies, like missing accounts, extra accounts, or mismatched privileges. 
  4. Conflict resolution (if necessary):
    • If discrepancies are found, they might be resolved automatically based on predefined policies. For instance, an orphaned account (an account that exists in a target system but not in the source system) might be automatically deactivated. 
    • In cases where automatic resolution isn't possible or desired, discrepancies might be flagged for manual review by administrators. 
  5. Update propagation:
    • Based on the comparison and any conflict resolution, necessary updates are sent from the IAM system to the target systems. This could involve creating, updating, or deleting accounts or adjusting privileges. 
  6. Logging and reporting:
    • All actions taken during the reconciliation process are logged. This includes data access, discrepancies found, updates made, and manual interventions. 
    • Reports might be generated to summarize the reconciliation process, highlighting any issues that need attention. 
  7. Notification:
    • Stakeholders or system administrators may be notified about the results of the reconciliation, especially if there are issues that need manual intervention or review. 
  8. Finalization:
    • Once all updates are made and any issues addressed, the reconciliation process is considered complete until the next scheduled or triggered run.

When it comes to addressing your unique security and compliance needs in the realm of identity governance, there is no better partner to assist you. Explore how our expertise can help you streamline and enhance reconciliation processes, ensuring the security of sensitive data, regardless of its location.

Let’s Connect

Managing identity can be complex. Let OpenIAM simplify how you manage all of your identities from a converged modern platform hosted on-premises or in the cloud.

For 15 years, OpenIAM has been helping mid to large enterprises globally improve security and end user satisfaction while lowering operational costs.

Download a Trial Contact Sales
footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2025 OpenIAM. All rights reserved.
  • Privacy Policy