Identity management systems
Encyclopedia
An identity management system refers to an information system, or to a set of technologies that can be used to support the management of identities
Identity management
Identity management is a broad administrative area that deals with identifying individuals in a system and controlling access to the resources in that system by placing restrictions on the established identities of the individuals.Identity management is multidisciplinary and covers many...

.

An identity management system:
  1. Establishes the identity
    1. Links a name (or number) with the subject or object;
    2. Re-establishes the identity (i.e. links a new or additional name, or number, with the subject or object);
  2. Describes the identity:
    1. Optionally assigns one or more attributes applicable to the particular subject or object to the identity;
    2. Re-describes the identity (i.e. changes one or more attributes applicable to the particular subject or object);
  3. Follows identity activity:
    1. Record and/or provide access to logs of identity activity
    2. Optionally auto-analyze behaviour patterns of the identity
  4. Destroys the identity

Electronic identity management

Several interpretations of identity management (IdM) have been developed in the IT
Information technology
Information technology is the acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of computing and telecommunications...

 industry. Computer scientists
Computer science
Computer science or computing science is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems...

 traditionally associate the phrase with the management
Management
Management in all business and organizational activities is the act of getting people together to accomplish desired goals and objectives using available resources efficiently and effectively...

 of user credentials and the means by which users might log on to an online system. With the emergence of phishing
Phishing
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT...

 attacks it became obvious that service provider identities also need to be managed. Phishing precisely exploits the difficulty of properly identifying and authenticating service providers on the web due to poor management of service provider identities .
With relation to online government services the term National Identity Management has been used. In general, electronic IdM can be said to cover the management of any form of digital identities.
The focus on identity management goes back to the development of directories, such as X.500
X.500
X.500 is a series of computer networking standards covering electronic directory services. The X.500 series was developed by ITU-T, formerly known as CCITT, and first approved in 1988. The directory services were developed in order to support the requirements of X.400 electronic mail exchange and...

, where a namespace
Namespace
In general, a namespace is a container that provides context for the identifiers it holds, and allows the disambiguation of homonym identifiers residing in different namespaces....

 serves to hold named objects that represent real-life "identified" entities, such as countries, organizations, applications, subscribers or devices. The X.509
X.509
In cryptography, X.509 is an ITU-T standard for a public key infrastructure and Privilege Management Infrastructure . X.509 specifies, amongst other things, standard formats for public key certificates, certificate revocation lists, attribute certificates, and a certification path validation...

 ITU-T
ITU-T
The ITU Telecommunication Standardization Sector is one of the three sectors of the International Telecommunication Union ; it coordinates standards for telecommunications....

 standard defined certificates carried identity attributes as two directory names: the certificate subject and the certificate issuer. X.509 certificates and PKI
Public key infrastructure
Public Key Infrastructure is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate...

 systems operate to prove the online "identity" of a subject. Therefore, in IT terms, one can consider identity management as the management of information (as held in a directory) that represents items identified in real life (e.g. users, organisations, devices, services, etc.). The design of such systems requires explicit information and identity engineering tasks.

The evolution of identity management follows the progression of Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

 technology closely. In the environment of static web pages and static portals of the early 1990s, corporations investigated the delivery of informative web content such as the "white pages" of employees. Subsequently, as the information changed (due to employee turnover, provisioning and de-provisioning), the ability to perform self-service and help-desk updates more efficiently morphed into what became known as Identity Management .

Typical identity management functionality includes the following:
  • User information self-service
  • Password resetting
  • Management of lost passwords
  • Workflow
    Workflow
    A workflow consists of a sequence of connected steps. It is a depiction of a sequence of operations, declared as work of a person, a group of persons, an organization of staff, or one or more simple or complex mechanisms. Workflow may be seen as any abstraction of real work...

  • Provisioning and de-provisioning of identities from resources


Identity management also addresses the age-old 'N+1' problem — where every new application may entail the setting up of new data stores of users. The ability to centrally manage the provisioning and de-provisioning of identities, and consolidate the proliferation of identity stores, all form part of the identity management process.

The term identity engineering refers to putting engineering effort into managing large numbers of interrelated items that have identifiers or names.

Types of Identity management systems

We can distinguish three main types of IMS:
  • Type 1: IMS for account management
    • Type 1 IMS are used within an organization especially for account and access administration for computers and network services (e.g. the Windows-NT-Domain-concept by Microsoft, NIS by SUN etc.).
  • Type 2: IMS for profiling of user data by an organization
    • Is used for managing and exploiting large amount of statistical user information (for instance in Marketing
      Marketing
      Marketing is the process used to determine what products or services may be of interest to customers, and the strategy to use in sales, communications and business development. It generates the strategy that underlies sales techniques, business communication, and business developments...

      ).
  • Type 3: IMS for user-controlled context-dependent role and pseudonym management
    • Type 3 IMS are characterised by the user control as basically decentralised, user and client-oriented (Management done by the user). The data managed are mainly personal data. This kind of IMS can for instance be found with the user profile
      User profile
      A user profile is a collection of personal data associated to a specific user. A profile refers therefore to the explicit digital representation of a person's identity...

       in social network service
      Social network service
      A social networking service is an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people, who, for example, share interests and/or activities. A social network service consists of a representation of each user , his/her social...

      s .

Solutions

Solutions which fall under the category of identity management may include:

Management of identities
  • Provisioning
    Provisioning
    In telecommunication, provisioning is the process of preparing and equipping a network to allow it to provide services to its users. In NS/EP telecommunications services, "provisioning" equates to "initiation" and includes altering the state of an existing priority service or capability.In a...

    /De-provisioning of accounts
  • Workflow automation
  • Delegated administration
    Delegated administration
    Delegated administration describes the decentralization of role-based-access-control systems. Many enterprises use a centralized model of access control. For large organizations, this model scales poorly and IT teams become burdened with menial role-change requests...

  • Password synchronization
    Password synchronization
    Password synchronization is a process, usually supported by software, through which a user maintains a single password across multiple IT systems. Provided all the systems enforce similar password standards Password synchronization is a process, usually supported by software, through which a user...

  • Self-service password reset


Access control
  • Policy-based access control
  • Enterprise
    Business
    A business is an organization engaged in the trade of goods, services, or both to consumers. Businesses are predominant in capitalist economies, where most of them are privately owned and administered to earn profit to increase the wealth of their owners. Businesses may also be not-for-profit...

    /Legacy single sign-on
    Single sign-on
    Single sign-on is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them...

     (SSO)
  • Web single sign-on (SeoS)
  • Reduced sign-on


Directory services
  • Identity repository (directory services for the administration of user account attributes)
  • Metadata
    Metadata
    The term metadata is an ambiguous term which is used for two fundamentally different concepts . Although the expression "data about data" is often used, it does not apply to both in the same way. Structural metadata, the design and specification of data structures, cannot be about data, because at...

     replication/Synchronization
  • Directory virtualization (Virtual directory
    Virtual directory
    In computing, a virtual directory or virtual directory server is a software layer that delivers a single access point for identity management applications and service platforms...

    )
  • e-Business scale directory systems
  • Next-generation systems - Composite Adaptive Directory Services (CADS) and CADS SDP


Other categories
  • Role-based access control
    Role-Based Access Control
    In computer systems security, role-based access control is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can be implemented via mandatory access control or discretionary access control...

     (RBAC)
  • Federation
    Federated identity
    A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems....

     of user access rights on web applications across otherwise untrusted networks
  • Directory-enabled networking and 802.1X EAP


Standards initiatives
  • Security Assertion Markup Language (SAML)
  • Liberty Alliance
    Liberty Alliance
    The Liberty Alliance was formed in September 2001 by approximately 30 organizations to establish open standards, guidelines and best practices for identity management...

     — A consortium promoting federated identity management
  • Shibboleth (Internet2)
    Shibboleth (Internet2)
    Shibboleth is an Internet2 project that has created an architecture and open-source implementation for federated identity-based authentication and authorization infrastructure based on Security Assertion Markup Language . Federated identity allows for information about users in one security domain...

     — Identity standards targeted towards educational environments
  • Global Trust Center
    Global Trust Center
    Global Trust Center is an international not-for-profit organisation that aims to develop policies to protect the rights and integrity of individual users of digital communications while reaffirming accountability and legal values...


List of Leading Identity management systems

  • Sun Identity Manager(will be supported only up to 2014)
  • Microsoft Active Directory in Windows Server
  • Microsoft Identity Lifecycle Manager 2007 and Microsoft Identity Integration Server
  • Microsoft Forefront IM 2010
    Identity Lifecycle Manager
    Microsoft Forefront Identity Manager is a state-based identity management software product, designed to manage users' digital identities, credentials and groupings throughout the lifecycle of their membership of an enterprise computer system...

  • Oracle IM 11g
  • IBM Tivoli IM
  • Novell IM
  • CA Technologies IM
  • Courion IM

Comparison of Leading Identity management systems

System Provisioning/De-provisioning of accounts Workflow automation Delegated administration Password synchronization Self-service password reset Policy-based access control Enterprise/Legacy single sign-on (SSO) Web single sign-on (SeoS) Identity repository (directory services for the administration of user account attributes) Metadata replication/Synchronization
Microsoft Active Directory between AD
MS FIM 2010
Oracle IM
System Provisioning/De-provisioning of accounts Workflow automation Delegated administration Password synchronization Self-service password reset Policy-based access control Enterprise/Legacy single sign-on (SSO) Web single sign-on (SeoS) Identity repository (directory services for the administration of user account attributes) Metadata replication/Synchronization

See also

:Category:Identity management systems

  • Identity management
    Identity management
    Identity management is a broad administrative area that deals with identifying individuals in a system and controlling access to the resources in that system by placing restrictions on the established identities of the individuals.Identity management is multidisciplinary and covers many...

  • Lightweight Directory Access Protocol
    Lightweight Directory Access Protocol
    The Lightweight Directory Access Protocol is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network...

     (LDAP)
  • Light-Weight Identity
    Light-Weight Identity
    LID is a management system for online digital identities developed in part by . It was first published in early 2005, and is the original URL-based identity system, later followed by OpenID. LID uses URLs as a verification of the user's identity, and makes use of several open-source protocols...

     (LID)
  • Metadirectory
    Metadirectory
    A metadirectory system provides for the flow of data between one or more directory services and databases, in order to maintain synchronization of that data, and is an important part of identity management systems. The data being synchronized typically are collections of entries that contain user...

     and Virtual directory
    Virtual directory
    In computing, a virtual directory or virtual directory server is a software layer that delivers a single access point for identity management applications and service platforms...

  • Network Information Service
    Network Information Service
    The Network Information Service, or NIS is a client–server directory service protocol for distributing system configuration data such as user and host names between computers on a computer network...

     (NIS)
  • OpenID
    OpenID
    OpenID is an open standard that describes how users can be authenticated in a decentralized manner, eliminating the need for services to provide their own ad hoc systems and allowing users to consolidate their digital identities...



  • Privacy enhancing technologies
    Privacy enhancing technologies
    Privacy enhancing technologies is a general term for a set of computer tools, applications and mechanisms which - when integrated in online services or applications, or when used in conjunction with such services or applications - allow online users to protect the privacy of their personally...

     (PET)
  • Single sign-on
    Single sign-on
    Single sign-on is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them...

     (SSO)
  • User profile
    User profile
    A user profile is a collection of personal data associated to a specific user. A profile refers therefore to the explicit digital representation of a person's identity...

  • Windows CardSpace
    Windows CardSpace
    Windows CardSpace , is Microsoft's now-canceled client software for the Identity Metasystem. CardSpace is an instance of a class of identity client software called an Identity Selector. CardSpace stores references to users' digital identities for them, presenting them to users as visual...

  • XML Enabled Directory
    XML Enabled Directory
    XML Enabled Directory is a framework for managing objects represented using the Extensible Markup Language . XED builds on X.500 and LDAP directory services technologies....

     (XMLED)
  • Yadis
    Yadis
    Yadis is a communications protocol for discovery of services such as OpenID, OAuth, and XDI connected to a Yadis ID. While intended to discover digital identity services, Yadis is not restricted to those. Other services can easily be included....


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK