Validating identidy

22-Aug-2016 07:54

Discovering Intentional and Unintentional Inconsistencies in Identity Data Inconsistencies in identity data typically develop over time in organizations as applications are added, removed or changed and as individuals attain or retain an ever-changing stream of access rights as they matriculate into and out of the organization.

At the same time, each new application that is added has the potential to produce a new completely unique user ID.

An identity correlation process must identify all orphan or defunct account identities that no longer belong from such drastic shifts in an organization’s infrastructure. Validating Individuals to their Appropriate Account IDs Under such regulations as Sarbanes-Oxley and Gramm-Leach-Bliley Act, it is required for organizations to ensure the integrity of each user across all systems and account for all access a user has to various back-end systems and applications in an organization.

If implemented correctly, identity correlation will expose compliance issues.

There are a number of basic strategies to perform this correlation, or "ID Mapping:" 1.

Privacy Concerns Often, any process that requires an in-depth look into identity data brings up a concern for privacy and disclosure issues.

At the same time, each new application that is added has the potential to produce a new completely unique user ID.

An identity correlation process must identify all orphan or defunct account identities that no longer belong from such drastic shifts in an organization’s infrastructure. Validating Individuals to their Appropriate Account IDs Under such regulations as Sarbanes-Oxley and Gramm-Leach-Bliley Act, it is required for organizations to ensure the integrity of each user across all systems and account for all access a user has to various back-end systems and applications in an organization.

If implemented correctly, identity correlation will expose compliance issues.

There are a number of basic strategies to perform this correlation, or "ID Mapping:" 1.

Privacy Concerns Often, any process that requires an in-depth look into identity data brings up a concern for privacy and disclosure issues.

A typical construct of the login ID, for example, can be the 1st character of givenname next 7 of sn, with incremental uniqueness.