Identity Management Plays a Key Role in Mobile Device Management (MDM)
Blog Article Published: 04/30/2013
By: Dan Dagnall, Chief Technology Strategist, Fischer International Identity As BYOD and other mobile device related initiatives take hold, sooner rather than later, identity management will once again be considered as an enforcement mechanism; and rightly it should. Identity and access management (IAM) has grown up over the years. Its early beginnings were in metadata management and internal synchronization of data to/from target applications. Lately it seems like one cannot roll out a new technology or service without considering the effect IAM will have on the initial roll-out, as well as ongoing enforcement of security, access, and policy related evaluations. IAM is becoming the hub for all things security and so it should be for mobile device management. MDM provides an administrative interface for managing server-related components, as well as self-service interfaces and over-the-air provisioning. All of these components are key to a successful BYOD strategy, and all of these components should consider IAM as the authority in terms of the overall decision making process.
- When to provision the device (including the association of the device to the end user)
- When to lock/wipe the device
- How to enable users the ability to request apps for download and which apps they qualify for.
- How to allow users to leverage the device for multi-factor authentication
Share this content on your favorite social network today!