Identity and Access Management (IAM), Identity and Access Governence (IAG), automated and centralised provisioning through IDM365
IAM Proof of Concept
Did you ever imagine you could try out an IAM solution with your own data… before you buy it?
IAM Proof of Concept ~ Did you ever imagine you could try out an IAM solution with your own data… before you buy it?
Try Before You Buy
Even when it comes to things as simple as buying a new phone or even a T-shirt, don’t we feel more comfortable when we have a chance to try it out first? We often don’t get that chance with enterprise-level software solutions, perhaps because of the complexity of implementation. But with IDM365, our rapid 4-step IAM implementation process has made providing an IAM Proof of Concept (POC) a viable option. See how to get up and running with our POC, and why it’s a sensible first step when choosing an identity and access management solution.
Purpose, Goals & Advantages
The purpose of conducting a proof of concept is to assess the feasibility of a product, testing out the functional requirements and its abilities. In our case, it allows us to showcase IDM365 in a way that proves the concept—that its tools for identity management and access governance work as marketed and as intended. The goal is to answer your doubts and queries, which may include the following:
Will the technology, control model and tools meet our needs for identity and access management?
Will this product perform as advertised?
Will business users be able to figure out this new way of managing identities and requesting access?
Will this help the prospective end user communities be more productive?
Will I have to worry about support and things breaking down?
Will this IAM solution make work and personnel management ultimately run smoother?
The advantages of starting with our IAM POC include:
No up-front requirements—All data will be hosted on our infrastructure, saving you from engaging your own IT resources and hardware.
Security—As the POC is hosted on our servers, you do not need to worry about it affecting your internal environment and infrastructure.
Seeing is believing—The POC is fully functional to showcase how simple and intuitive it is to control access by managing your attributes, roles, users… everything normally done manually in the system.
Free—The POC will be set up at no cost to you so you can evaluate our identity and access management solution without any overhead.
Facts, Parameters & Scope
The POC will be set up with only one system, Active Directory. (IDM365 works with any user provisioning system with an available web service or API. Many standard connectors are available, and specialized ones can be developed as necessary.)
Only a limited amount of data will be used upon agreement. The data from your organization will be fed to the system as covered in the Prerequisites section.
No client-specific modifications will be carried out in the POC; our IDM365 Generic version will be used.
What we need from you:
Once we have an agreement for the POC, we will need the data and structure for your organization. We have prepared a template for sending us this data so that the process goes smoothly without unnecessary delays. We will need the following things from you:
An outline of your business structure.
An idea of how many locations you have
Details about each department and manager
Worker information for the users being put in as part of the POC
Apart from the data to be used, you have the option to send us your company logo so it can be displayed in the interface.
Moving to Production
Once you are satisfied with the results of the POC, we have the product ready for moving to your production server if you so choose. The full implementation process with live data requires a few more steps to ready the infrastructure for IDM365. However, these steps are out of scope for this POC documentation. A separate document has been prepared for that.
After experimenting with the POC for a while, and seeing how your identities and access can be managed in real time, you should have the answers to any questions you may have had. We think you’ll also see how IDM365 can save you time, energy and costs when it comes to dealing with users, managing identities, controlling access, and saving your IT administrators from massive headaches along the way.
We look forward to hearing from you.
See our proof of concept working and running in your environment.
Still not sure how this works? Don’t worry, put in your request and we’ll walk you through it.