Outline of the first steps guide
To go from greenfield to a functional midPoint deployment, you will go through the following steps:
-
Decide what is it exactly that you need.
-
Which systems do you need to connect to identity management (IDM)?
-
What level of security do you need?
-
Consider your budget for long-term IDM expenses.
-
-
Connect and integrate your first source and target systems.
-
Map account attributes.
-
Clean up the data by fixing inconsistencies and handling orphaned accounts.
-
Automate some processes, such as the joiner-mover-leaver (JML) process.
Next steps
Before you get into the action, one important module remains: Get acquainted with the iterative approach on which this guide builds.
Was this page helpful?
YES
NO
Thanks for your feedback