Skip main navigation

Organizational Processes for IdAM

Understand why organizational processes are important to the identity and access management context.  

In this activity, you will learn about organizational processes in the IdAM context.

You have learned about the three key concepts (identification, authentication, and authorization), as well as governance. In this week, we will be pulling all these sections together to show you how they manifest operationally through organizational processes.

An IdAM implementation should address the requirements regarding managing a user’s identity over an entire lifecycle, which should also be in support of the primary business operation.

Processes that we will cover are registration, provisioning, maintenance, deletion, and exigent circumstances. In addition, we will cover how to select the right processes to meet your requirements.

This article is from the free online

Cyber Security Foundations: Identity and Access Management

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education