Case Study
Learn how four organizations
simplified and transformed
identity and access management.
Read now »

Identity Manager

Streamlining Access Governance through Automated User Management and Access Control

Cette page n'est pas disponible en français. Vous trouverez ci-dessous le contenu en anglais.

Identity Manager streamlines the access governance process of managing user identities, privileges and security enterprise-wide. It moves user management and access control away from IT capabilities and into the hands of the business. By leveraging an automated architecture, Identity Manager simplifies major identity and access management (IAM) tasks to a fraction of the complexity, time or expense of "traditional" framework solutions.

Identity Manager will help you:

  • Achieve your IAM objectives with less time and money than you thought possible
  • Ensure access to all applications, platforms, systems and data throughout the employee lifecycle
  • Deliver IAM without excessive customizations, drastically reducing the time and cost of consulting services
  • Provide automated provisioning of all resources with minimal coding requirements
  • Ensure user and resource provisioning meets your business objectives and is not limited by technology resources or capabilities
  • Enable business employees to manage identity lifecycle processes without involving IT resources through self-services
  • Incorporate workflow, attestation and separation of duty into IAM to achieve access governance, compliance, security and efficiency
  • Achieve successful deployment for faster time-to-value while promoting user adoption with Dell Professional Services
  • Access ongoing assistance from highly skilled, dedicated support professionals with the option to upgrade to Business Critical Support for 24/7 coverage across all global time zones

Features

  • Access governance - Enable business managers to understand what is in their environment and who has access to it while providing them with the ability to ensure that every individual has only the right access to do their job, nothing more.
  • Visionary architecture - Eliminate the typical barriers associated with adopting an IAM framework solution. Specifically Identity Manager’s visionary architecture makes implementing an identity access management solution a streamlined, business-optimized and rapidly deployed configuration process, instead of an expensive, time-consuming, and complex custom project.
  • Automated provisioning - Automatically provision to any system, platform or application using configuration rather than customization. You can deploy the solution and receive value within months rather than years.
  • Self-service lifecycle identity management - Enable non-IT users to provision accounts, physical assets and control access rights and permissions, with an intuitive and easy-to-use “shopping cart” interface.
  • Compliment existing investments - Support other systems, including “traditional” IAM frameworks, for a single, consistent IAM strategy that enables you to make the most of multiple best-in-class IAM solutions.
  • Business process management - Create workflows and attestations based on your business and policy needs. This maximizes security and compliance while eliminating common IAM inefficiencies and redundant processes.
  • Compliance-ready IAM stance - Address the cause of problems rather than the symptoms. It provides complete visibility into identity and access management helping you to achieve and maintain compliance with ongoing governance, using your own security policies.
  • Automated privileged governance - Gain a unified approach to governance, regardless of employee role and level of access needed. Users can request, provision and attest to privileged and general user access within the same console when you integrate Privileged Password Manager with Identity Manager.


Identity Manager provides a unified solution, simplifying the complex problems of identity and access management.

Sys Reqs

Database Server Minimum Requirements

Note: Identity Manager works with Microsoft SQL and Oracle Database systems. For more detailed information on system prerequisites see the Getting Started Guide.

Microsoft Windows Operating Systems
  • Windows Server 2003 SP2, Windows Server 2003 R2, Windows Server 2008, or Windows Server 2008 (R2) (32 bit or non-Itanium 64 bit)
  • Dual Quad Core 2.5 GHz+ Processor
  • 100 GB free disk space
  • 16 GB RAM
UNIX and Linux Operating Systems
  • See Operating System vendor for minimum requirements needed to host an Oracle database
Software Requirements
  • .Net 3.5 Service Pack 1 or later
  • SQL 2005 SP3, SQL 2008 SP1
  • Oracle database 10g Enterprise Edition version 10.2.0.4 and higher or Oracle database 11g r2 Enterprise Edition version 11.2 and higher (patch level will vary with operating system platform, Real Application Cluster is not supported)

Service Server Minimum Requirements

Microsoft Windows Operating Systems
  • Windows Server 2003 SP2, Windows Server 2003 R2, Windows Server 2008, or Windows Server 2008 (R2) (32 bit or non-Itanium 64 bit)
  • Single Quad Core 1.65 GHz+ Processor
  • 40 GB free disk space
  • 4 GB RAM
Software Requirements
  • .Net 3.5 Service Pack 1 or later
  • Microsoft Software Installation (MSI) Service
Linux Operating Systems
  • SuSE Enterprise Server 10
  • Single Core 1.65 GHz+ Processor
  • 40 GB free disk space
  • 4 GB RAM
Software Requirements
  • Mono 2.8

Client Requirements

Microsoft Windows Operating Systems
  • Windows XP SP3, Windows Vista, Windows 7 (32 bit or non-Itanium 64 bit)
  • 1 GHz+ Processor
  • 1024 x 768 screen resolution with 16 bit color
  • 100 MB free disk space
  • 2 GB RAM
Software Requirements
  • .Net 3.5 Service Pack 1 or later
  • Microsoft Software Installation (MSI) Service

Web Server Requirements

Microsoft Windows Operating Systems
  • Windows Server 2003 SP2, Windows Server 2003 R2, Windows Server 2008, or Windows Server 2008 (R2) (32 bit or non-Itanium 64 bit)
  • Single Quad Core 1.65 GHz+ Processor
  • 40 GB free disk space
  • 4 GB RAM
Software Requirements
  • IIS 6 or 7, or Apache 2.1
  • .Net 3.5 Service Pack 1
Linux Operating Systems
  • See Operating System vendor for minimum requirements needed to host Apache 2.1
Software Requirements
  • Apache 2.1
  • Mono 2.8
Browsers Supported
  • Internet Explorer from Version 7
  • Firefox from Version 3.X
Functional but not officially supported yet
  • Safari and Chrome

Language Supported:

  • German
  • US English

Videos

Self-Service Provisioning with Identity Manager

   

Introduction to the Identity Manager Access Portal

   

Migrating Away from Sun Identity Manager with the Dell Identity and Access Management Solution

   

Whiteboard Video - Simplified Identity and Access Management

   

Building Identity Intelligence into Your IAM Framework

   

Manager Attestation with Identity Manager

   

Automated provisioning with Identity Manager

 

Screenshots

GUI-Driven Workflow

GUI-Driven Workflow

The workflow creation is fully GUI driven, irrespective of the complexity of the workflow. Workflows can branch, call into other workflows, ask that tasks be done by connected systems, go back to users for input, and more. Everything that happens in the system can be governed by workflow.

Self-Serve Shopping Cart

Self-Serve Shopping Cart

When making requests, users can simply click "check" to check policies. This can be hidden or shown based on roles and rules.

Dashboard Display

Dashboard Display

In a quick glance, users get an accurate picture of the status of their environment and can clearly identify what requires their attention.

Employee View

Employee View

In one view, users can easily see identity and access information.

Entitlement Origin

Entitlement Origin

Managers can see when, how and why employees have entitlements.

Attestation

Attestation

Through attestation, data owners, managers, compliance officers, and others can attest the accuracy of information, entitlements, and explicit exceptions on a regular basis, or upon an auditor's request.

Docs

Services

Support

Our flexible support offerings for Identity Manager are designed to accommodate the unique needs of your organization.

Standard Support (Included)

Our standard offering delivers an extensive range of services, available Monday through Friday, during Dell Support business hours in a single geographic region (North America, Europe or Asia Pacific).

Business Critical Support

Our 24X7 provides assistance around-the-clock, including weekends and public holidays. It’s an essential level of service if you have locations across multiple regions worldwide, and for critical operations – such as identity management – that can’t afford to wait until Standard Support hours become available.

Premier Support is Available

Our highest offering is for organizations with complex environments that require a closer relationship with our support team and a more proactive approach to technical assistance. With Premier Support, you receive a dedicated Support Account Manager that works directly with your organization to provide account coordination, planning, onsite visits, escalation management and reporting. Premier Support is available with either Standard or Business Critical Support.

back to top

Implementation

The time and cost of services required for successfully deploying the Identity Manager solution are far less than you might expect. By favoring configuration over customization, our solution inherently has fewer consulting requirements compared to other vendors – we can typically get our customers up and running with visible results and value within 6 to 12 months. In contrast, other enterprise-level identity and access management solutions require an inordinate amount of customizations (that seemingly never end), resulting in significantly higher consulting time and money.

Our consultants are seasoned experts who work with your team hand-in-hand in four key phases:

  • Assessment – map Identity Manager functionality to your unique technology environment and business requirements and create a detailed blueprint for the implementation
  • Design – build the architecture according to the blueprint
  • Configuration – set up the software so that it acts according to the design
  • Deployment – implement the software and roll it out in your environment

A pre-packaged offering for Enterprise IAM Requirements Discovery Workshop is available for Identity Manager.

Enterprise Identity & Access Management (EIAM) Requirements Discovery Workshop back to top

Specialty

The Specialty Services available for Identity Manager are designed to provide you with any assistance you may require with pre and post-implementation activities to continuously raise the value of the software in your environment.

The following Specialty Services are available for Identity Manager:

  • Business Value Planning and Health Check Services
  • Custom Staff Augmentation Services

Services and offerings vary by region. If you are outside of North America, contact your Dell representative for information on Professional Services and the options in your region.

back to top