A Collaborative Approach To Identity and Access Management Implementation
by Bob Stephens, Director, Professional Services
The traditional approach to Identity and Access Management (IAM) has been to purchase a suite of products from a vendor and outsource the actual implementation and deployment of the solution to a professional service team. This was mainly due to the architecture of the product being based on proprietary components that required special knowledge in the configuration, implementation, and on-going support.
Aegis Identity Software was founded based upon our experience in the higher education market, realizing that traditional methods added an expense that was beyond the educational institution’s budgetary capacity. These costs were not just a one time fee, but extended to the full life cycle of the solution which included:
- Infrastructure support
- Changes to an evolving set of policies
- Changes to a large, changing constituency on an frequent basis
- Constituents that held multiple roles in the institution with frequent change
- Potential for product end of life requiring migration
Due to the Aegis Identity Software solution being based on readily available open standards, we are finding more and more institutions adopting a collaborative approach to the entire IAM solution process. The technologies used in the configuration of the solution are typically common knowledge within the institutions IT infrastructure and can be utilized in the entire solution life cycle.
As we assess the institution’s current versus future state and put together an implementation plan, the institution’s resources are considered in the actual statement of work, picking the areas they wish to do themselves in collaboration with the areas where they want our help. They are actively involved in every step, assuring they have complete control over the entire life cycle of their deployment. This allows for a phased approach to the implementation where they can evolve their IAM solution over a timeframe that best suits their overall deployment plan, utilizing their own limited resources as they require, while maintaining full control over their costs.
Of course, this process provides us with some exciting opportunities to evolve our products with this in mind, creating more efficient methods to enable the institution to do more and more of the implementations themselves with the ultimate goal of self sufficiency.