IAM analysis and recommendations

This analysis, carried out by an expert, will enable you to take a step back from your information system's identity and access management (IAM) process, and identify areas for improvement based on best practices..

Objectives

  • Helping you understand today's identity and access management (IAM) systems
  • Provide recommendations for improvement
  • Defining a target architecture

Methodology

  • Data flow workshops
    • Study data flows between applications
    • Manual data flow study
  • Life cycle workshops
    • Study the account lifecycle from creation to archiving
    • Comparison with the implementation of account lifecycles in other establishments or public institutions
    • Implementation of identity and access management best practices
  • Data migration workshops
    • Study of existing data
    • Study of the standardization of these data with respect to the Supann standard
    • Proposal for data conversion in accordance with IAM best practices

Deliverables

  • Analysis of current identity and access management and recommendations

All our services

FusionDirectory services

FusionDirectory can help you implement or improve your user account management.

Identity and access management analysis

The expertise provided in this analysis will give you an informed perspective on IAM within your IT system, enabling you to identify opportunities for improvement based on best practice.

Implementing the SupAnn standard

Identity management in universities is complex, with numerous categories of people whose status changes over time. The SupAnn standard in France formalizes this data to facilitate its integration into identity and access management (IAM).

Proof Of Concept

In complex environments, carrying out a Proof Of Concept phase will enable you to assess the transition effort required to implement and use IAM effectively.

Modernize your identity management

The implementation of FusionDirectory begins with the drawing up of functional and technical specifications, followed by installation, configuration and training of administrators and users in identity and access management.

Change management

Integrating software into an organization requires the support of all users. Change management is the methodology that enables an organization's transformation to be successful and efficient.

Training

We offer a range of training courses to help your teams become self-sufficient in identity management. What's more, we can design customized training programs to meet your specific needs.

Scroll to Top