Tuebora Blog

Communicate Your IAM Intent Directly to You Applications

The Tuebora team had a great week at Identiverse hosted in beautiful downtown Boston, MA. Although Samuel Adams failed to show up in person, that did not dissuade many other IAM professionals from around the world from coming out. There was a lot to see and hear this year in terms of content from a variety of speakers and a great sampling of vendors from the IAM industry present on the show floor.

Read More

In 2012 Randall Gamby wrote an interesting article on the relationship between identity management and compliance. He stated that identity and access management (IAM) systems could be broken down into two activity areas: predetermined and real-time access control. He went on to define them as:

Read More

The goals of any Identity and Access Management (IAM) program are to support an organization’s mission and activities by ensuring that access to data in the organization is granted to the right person at the right time and removed when that access is no longer needed. Identity management teams are challenged to perform this function in the most efficient way possible within the organization’s policies and governing legal requirements. There are three keys to the ongoing success of an identity and access management program.

Read More

Have you ever walked into a store to buy something very specific but ended buying a lot more than you actually use or wanted? If you answered yes, chances are that you did not have a choice as what you wanted was packaged as part of something larger. The end result is that the extra stuff not only burnt a big hole in your pocket but also ended up taking “shelf space”.

Read More

So you thought IAG was meant only for large companies that have thousands of employees and hundreds of applications? And IAG should primarily be used for mandated compliance? Not really….at the heart of governance is very simple principle – ensuring that there is a continuous and optimally matched set of identities and resources within the organization. More or less access to resources can result in losses to a business. More access can lead to fraud or misuse, while less access can lead to under-utilized resources or not meeting SLAs.

Read More

Irrespective of what business someone does, it is not easy to figure out the boundaries of access in an Organization. Be it undesired empowerment with excess access or being unable to perform one’s job function because of under access, the pain of figuring out the right access has always been a daunting task. How do I go about solving this?

Read More