IDManagement.gov is a collaboration between GSA and the Federal CIO Council. It is managed by the Identity Assurance and Trusted Access Division in the GSA Office of Government-wide Policy.
This playbook also outlines a four-step process that an agency can utilize to implement identify lifecycle management:
Document the purpose and goals of identity lifecycle management in an agency comprehensive ICAM policy.
Architect a centralized identity solution based on either using a virtual directory or an identity governance and administration (IGA) tool.
Create a master user record that aggregates digital identity attributes, entitlements, accounts, credentials, and other information.
Integrate identity lifecycle management into agency enterprise services.
Implement federation across agencies with NIST approved alternative phishing resistant credentials
This playbook is designed for identity program managers and enterprise and application architects interested in modernizing their identity management process to include alternative phishing resistant and remote identity vetting processes. Agencies are encouraged to tailor this playbook to fit their unique organizational structure, mission needs, and requirements. Other IT program participants, including program managers and application teams, may find value in incorporating this playbook approach in their planning.
The ILM playbook also outlines a four-step process that an agency can utilize to implement identify lifecycle management:
Document the purpose and goals of identity lifecycle management in an agency policy.
Architect a solution based on either using a virtual directory or an identity governance and administration (IGA) tool.
Create a master user record that aggregates digital identity attributes, entitlements, accounts, credentials, and other information.
Integrate identity lifecycle management into agency enterprise services.
This playbook is designed for identity program managers and enterprise and application architects interested in modernizing their identity management process. Agencies are encouraged to tailor this playbook to fit their unique organizational structure, mission needs, and requirements. Other IT program participants, including program managers and application teams, may find value in incorporating this playbook approach in their planning.
The ILM playbook has repeated lines.
This playbook also outlines a four-step process that an agency can utilize to implement identify lifecycle management:
This playbook is designed for identity program managers and enterprise and application architects interested in modernizing their identity management process to include alternative phishing resistant and remote identity vetting processes. Agencies are encouraged to tailor this playbook to fit their unique organizational structure, mission needs, and requirements. Other IT program participants, including program managers and application teams, may find value in incorporating this playbook approach in their planning.
The ILM playbook also outlines a four-step process that an agency can utilize to implement identify lifecycle management:
This playbook is designed for identity program managers and enterprise and application architects interested in modernizing their identity management process. Agencies are encouraged to tailor this playbook to fit their unique organizational structure, mission needs, and requirements. Other IT program participants, including program managers and application teams, may find value in incorporating this playbook approach in their planning.