sponsored by Agilysys-Sun Technology Solutions
Posted:  09 Mar 2009
Published:  09 Mar 2009
Format:  PDF
Length:  7  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:
If you're planning on simplifying and consolidating an IAM infrastructure, start with the foundational layer of the identity store. Rather than search for the monolithic master directory, directory virtualization and synchronization offer ways to add simplicity, flexibility and unification to the identity data infrastructure while leaving the data where it most belongs. A virtualization layer allows services in the underlying data store to be designed to their strengths - directories remain directories and databases remain databases - but are still able to deliver the data to applications the way they need to see it through common protocols.

Understanding and accounting for all the identity stores in the infrastructure is of paramount importance. Accounts belonging to the same person need to be identified and reconciled as such. Data that is redundant across multiple sources should be identified and evaluated for synchronization. Virtual directories can synchronize identity sources by updating through a virtual view which joins the sources. Also a synchronization product such as Sun's Identity Synchronization for Windows, can be leveraged to provide some reliable, easy to manage synchronization between different directories.




Author

Jeff Smith
Software and Services Engineer ,  Agilysys Sun Technology Solutions



BROWSE RELATED RESOURCES
Endpoint Security | Identity Management | Password Authentication Protocol | Server Virtualization | VMware

View All Resources sponsored by Agilysys-Sun Technology Solutions

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement