IBM Verify

IBM Verify

Join this online user group to communicate across Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only

Integrate you applications and systems with your Identity Governance solution

By Pier Luigi Rotondo posted Mon October 21, 2019 10:34 AM

  

In this article, we explore how to integrate your business applications and systems with your Identity Governance solution, based on IGI - IBM Security Identity Governance and Intelligence. 

 

IGI leverages on the Enterprise Connectors application and Identity Adapters, to align its data with the peripheral target systems. 

Identity Adapters are the systems integration that link IBM Security Identity Governance and Intelligence, to the customer’s enterprise systems and applications. Adapters enforce identity security policies on the customer’s servers and applications. To date, approximately 50 types of Identity Adapters support data exchange between IGI and operating systems, middleware, and applications. IGI comes with some large use adapters already preinstalled. 

For a full list, refer to the technote at http://www.ibm.com/support/docview.wss?uid=swg21687732, which has a complete and up-to-date listing of the supported Identity Adapters. Each adapter has its own prerequisites, supported configuration, and limitations. Make sure to consult the adapter’s documentation before planning, installing, and configuring the adapter. 

 

All Security Identity Adapters follow the same installation and configuration steps. First, the system administrator installs the adapter on the target system to control with IGI. This step is only required for targets that are directly controlled from an adapter. Some targets do not require the installation of an adapter, and IGI connects directly with the controlled target system. Then import into IGI the adapter profile, a jar file enclosed in the adapter package for the specific target. When the target system is ready, and the adapter profile loaded, you can start with creating the connector. 

 

Eventually, test the connection and make sure IGI properly communicates with the peripheral target system. Eventually the adapter is available for usage in your identity governance environment. 

 

For further details and to practice with Identity Adapters in IGI, use the guided exercise at https://www.securitylearningacademy.com/course/view.php?id=4384 

0 comments
9 views

Permalink