|
![]() ![]() ![]()
Expert Answers to Biz Questions Listen in! Pick up some expert advice to a reader's question that we selected from CyberSchmooz.
7 Tips for Creating and Implementing a Reliable Identity Management Strategy
With identity management, organisations are able to maintain digital profiles of every one of its users and put policies in place to govern what data and business applications they are able to access. There are many mistakes that are commonly made when it comes to setting up and implementing an identity management system and these can easily be avoided when you know what they are. In this piece, we will share ideas you can implement throughout your project in order to save you grief and time later. 1. Take stock of your users, services, and systems You must get a good inventory of your users, services, and systems before you take the next step of implementation. When you are getting through the creation of the list, be sure to take note of how each service or system will be accessed, that is, by department, group, individual, and so on. Don’t overlook this crucial step as it will help you avoid unnecessary integration surprises in future, as well as help you decide which systems should be included in a proof of concept. 2. Plan adequately One of the easiest ways to mess up your strategy is to not plan the rollout of a new software adequately. Implementing a badly planned initiative is a recipe for failure as identity management determines how users access data and apps. You must identify your goals and plan for the long term in order to have a sustainable initiative. 3. Employ dedicated IT staff You really can’t say you take identity management seriously if you are not willing to invest in IT resources. It does you no good to have too few staff bombarded with too many responsibilities. Stop treating identity management as a side project and dedicate at least one IT professional to handle identity management full-time. This is the only way you can prevent your project from remaining at a stand-still sometime down the road. 4. Choose the right product Choosing the right product is way more than simply going for the most popular option. Every organisation is unique and requires a solution to fit its specific needs. Use a service that focuses on your needs first and not just the service they hope to sell you. ProofID IAMS solutions is a good example of a company that does just that as they readily move at your own pace. 5. Take the time to train During the process of drafting your implementation plan, you must remember to provide training for stakeholders such as IT security, human resources, compliance, the support desk, and of course the normal system user. Depending on the role each of the parties will play in administering the system, some may need to receive more detailed training than others. 6. Decide on a “golden source” for user passwords and IDs You should pick the “golden source” where passwords and IDs of users will be stored before you proceed to implement the initiative. Decide upfront whether you want to use the internal database contained in the identity management system itself, a Light Weight Directory Access Protocol server, or Microsoft Active Directory. 7. Get everyone involved It is absolutely crucial that you get all the stakeholders involved right from the start and frequently after the project has been implemented. By stakeholders, we mean user groups, IT security, executive management, help desk, audit, human resources, and compliance. This is not an exhaustive list, but the point remains that you should make sure everyone that might have an input is involved all the way.
![]() Small Business Tax Center • Idea Cafe Home • Sign Up • Biz Grant Center • CyberSchmooz •Coffee Talk with Experts • People in Biz Profiles • Starting Your Biz • Biz Planning • Running Your Biz • FREE Trade Publications • Marketing • Financing Your Biz • Human Resources • Legal & Biz Forms • Managing Your Biz • eCommerce • You and Your Biz • Gen X • Work@Home • The Fridge • De-Stress • Send an Award • Send an eGreeting • Yoga @ Your Desk • Web Guide • Idea Cafe in the News • About Idea Cafe • Advertise on Idea Cafe • Contact Us • Privacy Policy • Site Map • Small Biz News
Copyright 1995-2023, Idea Cafe Inc. Downloads are for personal use only, not for resale to others, and may not be reprinted in any form without written permission from Idea Cafe Inc.
DISCLAIMER: We hope whatever you find on this site is helpful, but be cautioned that it may not apply to your own situation, or be totally current at any given time. Idea Cafe Inc. and all of its current and past experts, sponsors, advertisers, agents, contractors and advisors disclaim all warranties with regard to anything found anywhere on this family of websites, quoted from, or sent from Idea Cafe. and its related sites, publications and companies. We also take no responsibility for comments published by others on these pages. TRADEMARKS: The following are Registered Trademarks or Servicemarks of DevStart, Inc.: Idea Cafe®, Online Coffee Break®, The Small Business Gathering Place®, Take out Info®, Biz Bar & Grill®, Complaint-O-Meter®, A Fun Approach to Serious Business, CyberSchmooz, and BizCafe.
|
|