| 
  Context
  Tool mentors explain how a tool can perform tasks, which are part of ITUP processes and activities.  The tasks are listed as Related Elements in the Relationships section.
 You can see the details of how processes and activities are supported by this tool mentor, by clicking the links next to the icons: 
  Details
    IBM® Tivoli® Identity Manager provides a secure, automated and policy-based user management solution that enables
    businesses to address the challenge to do more with fewer resources and to effectively and securely manage user
    identities throughout their life-cycle, across both legacy and e-business environments. IBM Tivoli Identity Manager has
    at its disposal the facilities to provide security access controls using the utilization of provision policies,
    reconciliation, password resets and workflows.
 
    Through centralized control, IBM Tivoli Identity Manager empowers organizations with the ability to provide security
    access controls by dictating what accounts should exist and under what guidelines or policies. These guidelines are
    defined by a set of provisioning policies, which assign entitlements on role-based memberships. Modification of role
    memberships provides a quick method of access control, as this action can provisions or de-provisions large numbers of
    identities across a wide variety of systems. In the event of unauthorized access, large or small, access control
    protection may be applied through the de-commission or modification of targeted accounts. Additionally, for end of
    life-cycle activities, IBM Tivoli Identity Manager, can revoke access to identities through entitlement removal. This
    effectively controls access to managed end-points through de-provision. See Chapter 17: Provisioning Policies in the
    IBM Tivoli Identity Manager Policy and Organization Administrator Guide version 4.5.1.
 
    Security access controls are also implemented through the use of the system reconciliation feature. With this
    operation, the server can detect account creations, modifications, or deletions made on an endpoint machine and enforce
    changes if any non-compliances are found. For example, if a malicious user account becomes member of a group and its
    membership to the group is outside of policy, upon service reconciliation, those attributes modified will be rectified
    on the end point. The previous effectively provides access controls on the endpoint because actions can be taken in the
    form of suspension, removal, or correction of non-compliant accounts. See Chapter 32: Reconciliations in the IBM
    Tivoli Identity Manager Policy and Organization Administrator Guide version 4.5.1.
 
    Within IBM Tivoli Identity Manager, security access controls are also enforced with the use of account passwords
    resets. Password resets are available using self-care, administrative or help desk type roles, but become an important
    access control tool when used to reset compromised account passwords. IT Administration may push down whole
    organization password resets and securely distribute these passwords to account owners. Complimenting password resets,
    password policies within IBM Tivoli Identity Manager keep the new passwords consistent with corporate character
    complexity. See Chapter 25: Password and Logon Properties and Chapter 21: Password Policies in the IBM Tivoli Identity
    Manager Policy and Organization Administrator Guide version 4.5.1.
 
    Workflow mechanisms complete the security access controls by providing the flexibility to implement business-centric
    workflows that regulate whether actions may take place. To accommodate complex business models, IBM Tivoli Identity
    Manager can have workflows designed to require approvals that regulate access controls based on a variety of
    participant approvers. Additionally, request for information workflows further refine approval to the account attribute
    level. See Chapter 7 and 8: Workflow and Workflow JavaScript® Extensions in the IBM Tivoli Identity Manager Policy and
    Organization Administrator Guide version 4.5.1.
 
    For More Information
    For more information about this tool, click on the link for this tool at the top of this page.
 |