Reduce Complexity of Identity Management
Empower people with end-user self-service capabilities embedded in Outlook or delivered via a familiar SharePoint experience.
- User self-service. Administrators can empower users (via policy) to self-remediate identity issues – including identity management, group membership, smart card, and password reset functions.
- Easy-to-use interface. Common experiences such as resetting a PIN or a password, creating a group or mail distribution list, or adding users to a group are integrated into Windows, Outlook, and SharePoint, enabling information workers to easily perform common self-service tasks.
- Increased productivity. Greater productivity and end-user satisfaction through faster time to problem resolution, while lowering helpdesk costs.
Simplify identity lifecycle management through automated workflows and business rules and easy integration with heterogeneous platforms.
- Consolidated, cross-platform identity support. Identity and group provisioning and management can be automated based on business policy and implemented via workflow-driven provisioning through a single interface. This automated identity management across heterogeneous systems lowers IT costs and reduces opportunities for error.
- Built-in smart card management. Centrally manages the smart card provisioning process to drastically reduce the costs typically associated with deploying multi-factor authentication.
- Easy extensibility. Integrates with familiar developer tools to easily extend capabilities as needs change. Extending FIM to support new scenarios is simple, using existing identity management tools, through the Visual Studio and .NET development environments.
Improve security and compliance with auditing across identities, role-based access control, and deep role discovery.
- Role-based access administration. Allows IT to discover and map permissions across multiple systems to individual, assignable roles. Role mining tool assists in discovering the various permission sets for users across the enterprise to be later modeled and applied centrally.
- Centrally-enforced identity policy. Consistency of identity information and application of user roles across enterprise identity systems is automatically maintained. Provides IT and auditors with a single view of individual users and resources, increasing visibility into the compliance and security state of systems across your organization.
- In-depth auditing and reporting. All activities and historical states can be audited and reported on, including each event, stage of a workflow, when it took place, and any associated approvals, using familiar tools like SQL Server and System Center.