Netegrity updates ID management software

Netegrity has rolled out the latest version of its IdentityMinder software featuring integrated user administration and resource...

Netegrity's latest version of its IdentityMinder software features integrated user administration and resource provisioning capabilities.

The technology is aimed at letting administrators automate the task of creating and managing user identities and control access to services based on those identities, said Deepak Taneja, a vice-president at the company.

Netegrity's product is the latest in an emerging category of software from companies such as IBM, Novell and Oblix, which aim to tie together access control, authentication, authorisation and application provisioning functions.

"It is really all about service delivery and user productivity by giving them the right access to the systems they need, much faster," said Jonathan Penn, an analyst at Forrester Group.

From an administrative standpoint, the centralisation and automation provided by such technologies can save time and money, Penn said.

With it, for instance, administrators can automate the process of adding new users or groups, changing access rights, delegating password management and deleting user accounts when a person leaves a company.

Driving the need for such products is a slew of short- and long-term issues, according to Albert Braunberg, an analyst at Current Analysis.

Among them are the growing adoption of web services, the need to secure business-to-business transactions through better ID management and enterprise IT's focus on ROI, he said.

Braunberg adding that such products are most likely to appeal to very large corporations.

Netegrity's product integrates its previous access control functionality with application provisioning software from Business Layers. The two companies had announced a partnership earlier this year.

Key features of the integrated package include the following:

  • Password management capabilities that enable self-service password reset and synchronisation across multiple applications.
  • Role-based access control and administration.
  • A rules-based engine for provisioning access to LDAP and other directories, databases, ERP and CRM applications.
  • Auditing and reporting capabilities for collecting, storing and managing user information.

Jaikumar Vijayan writes for Computerworld

Read more on IT strategy