Preview

Vestnik NSUEM

Advanced search

REALITY BASED IDENTITY MANAGEMENT IS READY FOR LEADERSHIP. A PROSPERING PERSPECTIVE FOR SECURITY AND BUSINESS PREMISED ON IDENTITY MANAGEMENT ANALYTICS & IN-MEMORY-DATABASES

Abstract

Mounting security and compliance demands are pushing businesses to implement accurate identity management in their IT systems. As an interface between the company`s organizational structure and an ERP (Enterprise Resource Planning) system, identity management is subjected to change on both sides. Keeping real-life requirements in line with configured authorizations means responding to these changes. But in reality, very few companies bother to make thorough, real-time adjustments to their systems after implementation – with far-reaching consequences: their concepts become incompatible with their requirements. 

These kinds of discrepancies reduce the quality of business processes, compromise security and drive up costs – making reality-based identity management based on an extensive usage analysis imperative. Up-to-date ERP systems based on in-memory-databased are gifted with integrated analytic capabilities. These capabilities properly used are the key instrument to align identity management to company needs, providing a transparent, lasting security concept and reduce costs throuth accurate license management. In close cooperation with a formerly aligned authorization concept, the use case even goes beyond: a reality based identity management will be enabled wich can be realized as leading control system – with in-time indicators for business and/or compliance issues – to ensure accurate business activities. 

About the Author

M. Fuller
University of Applied Sciences Neu-Ulm, Neu-Ulm, Germany
Germany

Professor, University of Applied Sciences Neu-Ulm, Neu-Ulm, Germany.



References

1. Beyer S.-A. et al. SAP Berechtigungswesen. Design und Realisierung von Berechtigungskonzepten für SAP ERP und SAP Enterprise Portal. Galileo, Bonn, 2003.

2. Ferraiolo D., Kuhn R. Role-Based Access Control. Reprinted from 15th National Computer Security Conference (1992), Baltimore MD. P. 554–563. URL: http://csrc. nist.gov/rbac/ferraiolo-kuhn-92.pdf, Erstellungsdatum, 1992.

3. Ferraiolo D. et al. Role-Based Access Control. 2nd Edition, Artech House, Norwood, 20 07.


Review

For citations:


Fuller M. REALITY BASED IDENTITY MANAGEMENT IS READY FOR LEADERSHIP. A PROSPERING PERSPECTIVE FOR SECURITY AND BUSINESS PREMISED ON IDENTITY MANAGEMENT ANALYTICS & IN-MEMORY-DATABASES. Vestnik NSUEM. 2015;(4):317-321. (In Russ.)



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6495 (Print)