IBM Security Identity Manager (Product)
Vendor | |
---|---|
Product Name | IBM Security Identity Manager |
Page Version |
|
Product Page | https://www.ibm.com/support/knowledgecenter/SSRMWJ_7.0.2/com.ibm.isim.doc/kc-homepage.html |
Description |
|
Access Management | In a security lifecycle, IBM Security Identity Manager and several other products provide access management. You can determine who can enter your protected systems. You can also determine what can they access, and ensure that users access only what they need for their business tasks. |
Support for corporate regulatory compliance | Security Identity Manager addresses corporate regulatory compliance in the following key areas:
|
Identity Governance | Identity governance includes these Security Identity Manager features:
|
Recertification | Recertification simplifies and automates the process of periodically revalidating users, accounts, and accesses. The recertification process automates validating that users, accounts, and accesses are still required for a valid business purpose. The process sends recertification notification and approval events to the participants that you specify. |
Reporting | Report is a summary of Security Identity Manager activities and resources. You can generate reports based on requests, user and accounts, services, or audit and security. |
Static and dynamic roles | In static organizational roles, assigning a person to a static role is a manual process. In the case of a dynamic role, the scope of access can be to an organizational unit only or to the organizational unit and its subunits. Dynamic organizational roles use valid LDAP filters to set a user's membership in a specific role. |
Self-access management | IBM Security Identity Manager allows users and administrators the ability to request and manage access to resources such as shared folders, email groups, or applications. |
Provisioning features | Security Identity Manager provides an integrated software solution for managing the provisioning of services, applications, and controls to employees, business partners, suppliers, and others associated with your organization across platforms, organizations, and geographies. Security Identity Manager addresses provisioning of enterprise services and components in the following areas:
|
Resource Provisioning | Depending on business needs, IBM Security Identity Manager provides alternatives you can use to provision resources to authorized users. Alternatives are based on requests, roles, or a combination of requests and roles. |
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.