White, 2008

Type

Article

Title

The Architecture of Identity Management

Authors

White, P.

Year

2008

Harvard

White, P., 2008. The Architecture of Identity Management. Presented at the ISACA Oceania Computer Audit Control and Security Conference, p. 8.

Links

http://www.academia.edu/download/32480344/The_Architecture_of_Identity_Management.pdf

Abstract

The use of Identity Management to control access to applications and resources is emerging as a key concept in meeting the requirements of information security. This paper looks at the design and implementation of Identity Management within the Australian Public sector and discusses some of the issues encountered. The paper describes the major elements of an Identity Management Architecture and discusses the use of processes as chokepoints to enhance identity and authentication security. This paper proposes an Identity Management Architecture to meet both information security and strategic requirements and also be ready to move towards a federation with other enterprises. This work should contribute to the further development of Identity Management models.

The Identity Management Architecture shows how an enterprise can maximise its current resources and policies to improve information security as well as position it to achieve strategic goals. The architecture shows how information security is actually an enterprise objective not just an IT requirement. The architecture shows enterprises how to approach and improve their own information security by using this type of holistic architecture.

(White, 2008, p. 1)


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.