Efficient identity registration, proofing and creation
Efficient changes in employees status, location
Requirements related to the provisioning / deprovisioning of non-IT assets
Opportunities
Collaborate on the maintenance of high-quality identity attributes
Risks
May be difficult to integrate with, may lack incentives or interest in collaborating with security teams to ensure sound custody of key user information (Maxim and Cser, 2017, p. 3, and Royer, 2013, p. 56)