........................................................................................................................................................ 3 Introduction.................................................................................................................................................... 4 The Solution: Identity Intelligence ................................................................................................................. 6 What is Identity Intelligence? ..................................................................................................................... 6 Traditional Strategies for IAM .................................................................................................................... 6 Using Point Solutions .............................................................................................................................................. 6 Using an IAM Framework........................................................................................................................................ 7 A Unified and Intelligent Approach to IAM ................................................................................................. 7 Key Features of a Unified and Intelligent Approach to IAM ..................................................................................... 7 An Illustration .......................................................................................................................................................... 8 Using a Unified and Intelligent Approach to IAM ..................................................................................................... 8 Provisioning ................................................................................................................................................. 10 Challenges of Traditional Provisioning .................................................................................................... 10 A Unified and Intelligent Approach to Provisioning .................................................................................. 11 Single Sign-on ............................................................................................................................................. 13 Types of SSO Solutions ........................................................................................................................... 13 Comparing the SSO Approaches .......................................................................................................................... 14 True SSO .............................................................................................................................................................. 15 The Best Option: a Blended Approach .................................................................................................... 15 Role Management ....................................................................................................................................... 17 Using Custom Business Logic as a Workaround .................................................................................... 18 A Unified and Intelligent Approach to Role Management ........................................................................ 18 Multifactor Authentication ............................................................................................................................ 20 A Unified and Intelligent Approach to Multifactor Authentication ............................................................. 20 Password Management .............................................................................................................................. 22 One Option: Self-Service Password Management .................................................................................. 22 A Unified and Intelligent Approach to Password Management ............................................................... 22 Privileged Account Management ................................................................................................................ 24 A Unified and Intelligent Approach to Privileged Account Management ................................................. 24 What if I Already Have an IAM Framework? ............................................................................................... 26 Conclusion................................................................................................................................................... 28