Identify the appropriate identity management response to security and other directives. This includes providing or revoking identities or carrying out other actions.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.