Method of assessing an organization's network identity capability
First Claim
1. A method of implementing network identity capability within an organization, the method comprising:
- assessing the organization'"'"'s identity capabilities regarding the organization'"'"'s employees, customers, technology infrastructure, and relationships with business partners;
assessing the organization'"'"'s identity requirements regarding the employees, customers, technology infrastructure and relationships with business partners;
redesigning said technology infrastructure to accommodate said identity requirements, wherein said redesigning involves establishing a set of common identity definitions for use within the technology infrastructure, said services and the relationships with said business partners;
enabling role-based access to services offered by the organization;
decoupling users'"'"' identity information from the users'"'"' access to said services, wherein the users include at least the employees and the customers, wherein said decoupling users'"'"' identity comprises enabling users to access a plurality of said services offered by the organization after a single authentication of the users'"'"' identity; and
obtaining user identity information from a trusted identity provider service external to the organization.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of determining an organization'"'"'s network identity capability. The organization'"'"'s relationships with its employees, customers and business partners, and the organization'"'"'s technological infrastructure, are examined. By examining the organization'"'"'s use of identity data (e.g., data identifying customers, employees), the organization'"'"'s management of that data, and the technology infrastructure can be redesigned to enable better network identity capability. Improved network identity capability enables users'"'"' access to multiple applications or services through a single authentication process (e.g., a single login or sign-on), device-independent access to those applications and services, greater protection for the data, improved business processes and collaborations with business partners, etc.
27 Citations
10 Claims
-
1. A method of implementing network identity capability within an organization, the method comprising:
-
assessing the organization'"'"'s identity capabilities regarding the organization'"'"'s employees, customers, technology infrastructure, and relationships with business partners; assessing the organization'"'"'s identity requirements regarding the employees, customers, technology infrastructure and relationships with business partners; redesigning said technology infrastructure to accommodate said identity requirements, wherein said redesigning involves establishing a set of common identity definitions for use within the technology infrastructure, said services and the relationships with said business partners; enabling role-based access to services offered by the organization; decoupling users'"'"' identity information from the users'"'"' access to said services, wherein the users include at least the employees and the customers, wherein said decoupling users'"'"' identity comprises enabling users to access a plurality of said services offered by the organization after a single authentication of the users'"'"' identity; and obtaining user identity information from a trusted identity provider service external to the organization. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer readable storage medium storing instructions that, when executed by a computer, cause the computer to perform a method of implementing network identity capability within an organization, the method comprising:
-
assessing the organization'"'"'s identity capabilities regarding the organization'"'"'s employees, customers, technology infrastructure, and relationships with business partners; assessing the organization'"'"'s identity requirements regarding the employees, customers, technology infrastructure and relationships with business partners; redesigning said technology infrastructure to accommodate said identity requirements, wherein said redesigning involves establishing a set of common identity definitions for use within the technology infrastructure, said services and the relationships with said business partners; enabling role-based access to services offered by the organization; decoupling users'"'"' identity information from the users'"'"' access to said services, wherein the users include at least the employees and the customers, wherein said decoupling users'"'"' identity comprises enabling users to access a plurality of said services offered by the organization after a single authentication of the users'"'"' identity; and obtaining user identity information from a trusted identity provider service external to the organization.
-
Specification