tag:blogger.com,1999:blog-21995415.post7773060951077165793..comments2024-02-01T11:08:01.659-05:00Comments on Matt Flynn: Information Security | Identity & Access Mgmt.: Filling the Gap in Identity and Access GovernanceMatt Flynnhttp://www.blogger.com/profile/09902381553517250020noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-21995415.post-2286897607801273172012-07-04T19:13:10.675-04:002012-07-04T19:13:10.675-04:00Hey Matt
Nice article. Due to the fact that it...Hey Matt<br /><br />Nice article. Due to the fact that it's posted in the Technet Magazine it's related onyl to Active Directory, but overall it applies also to environments driven by other directory services such as OpenLdap or whatever. The challenge stays the same.<br /><br />I like the 6 step model into Access Governance, but at the end it opens up the following questions:<br />1) How are user account provisioned to access granting roles in out of an controled environment?<br />2) How would the provisioning process itself fit into the governance piece?<br /><br />I think the answer is pretty simple: You'll need an deep integration of IAG and IAM to achieve the long term goals forcing IAG projects.<br /><br />Cheers<br />Carstenichhttps://www.blogger.com/profile/04389339213747149360noreply@blogger.com