David Edwards

By David Edwards on April 15, 2019

IGDM Part 3 – Implementing the Identity Governance Data Model

This blog is the third in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The proposed IGDM is designed to standardize identity management and governance data […]

Continue reading

By David Edwards on April 15, 2019

IGDM Part 2 – Validating the Proposed Identity Governance Data Model

This blog is the second in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The proposed IGDM is designed to standardize identity management and governance data […]

Continue reading

By David Edwards on April 15, 2019

IGDM Part 1 – Proposing an Identity Governance Data Model

This blog is the first in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The proposed IGDM is designed to standardize identity management and governance data […]

Continue reading

By David Edwards on December 3, 2018

Housekeeping Scripts for an IGI Deployment

Housekeeping of an IBM Security Identity Governance and Intelligence (IGI) deployment is normally dependent on the operational practices of where it’s deployed. The following article is an example of a set of housekeeping scripts that were developed by the IBM Security Product Professional Services (PPS) team in Germany to support a customer deployment. They are […]

Continue reading

By David Edwards on August 12, 2018

Identity Management and SAP Users, Roles and Transactions – Part1

A question that is often asked in identity management discussions is “will your product show me what SAP Transactions my users have access to?”. SAP is built, historically, on transactions (from the R2 mainframe CICS heritage) so the question seems to make sense. The answer is both no and yes. But the problem is that […]

Continue reading