Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Consulting

Hall 7 / Booth Number 7-234

Identity & Access Management (IAM, IDM)

Key Facts

  • Role, rights and authorization concepts
  • User lifecycle management
  • Real-time quick-check of roles and permissions

Product Description

Professional identity management supports the management of digital identities with all the associated attributes and characteristics (user lifecycle management). It regulates the automated generation and deletion of user accounts and ensures a consistent information status in all connected IT systems, regardless of whether they are located in your own data center or in the cloud. Access Management manages the rights of authorized users to access a service, while blocking access for unauthorized users. Together, Identity & Access Management (IAM) enables the complete and uniform maintenance and control of user accounts and authorizations across applications, services, platforms and devices. With IAM, you keep track of defined rights, assign roles reliably, and receive (partially) automated support, for example, in withdrawing authorizations when employees are leaving the organization or are changing roles. We offer you: • Creation of role and authorization concepts • Optimization and consulting on all topics of user lifecycle management • Design and implementation of IAM systems • Real-time quick-check of roles and permissions
... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.