<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VTM Web Services, Author at IDPro</title>
	<atom:link href="https://idpro.org/author/vtm-webservices/feed/" rel="self" type="application/rss+xml" />
	<link>https://idpro.org/author/vtm-webservices/</link>
	<description>The Professional Organization for Digital Identity Management</description>
	<lastBuildDate>Thu, 29 Jan 2026 23:58:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://idpro.org/wp-content/uploads/2023/07/cropped-idpro_stickerA-circle-100-32x32.jpg</url>
	<title>VTM Web Services, Author at IDPro</title>
	<link>https://idpro.org/author/vtm-webservices/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Understanding Non-Human Identities (NHI) Part 2: Lifecycle</title>
		<link>https://idpro.org/understanding-non-human-identities-nhi-part-2-lifecycle/</link>
		
		<dc:creator><![CDATA[VTM Web Services]]></dc:creator>
		<pubDate>Mon, 29 Dec 2025 21:26:28 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[non-human identity]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2920</guid>

					<description><![CDATA[<p>NHIs are here, performing countless actions on our behalf. Understanding them begins with seeing that every non-human identity represents accountability, [&#8230;]</p>
<p>The post <a href="https://idpro.org/understanding-non-human-identities-nhi-part-2-lifecycle/">Understanding Non-Human Identities (NHI) Part 2: Lifecycle</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>NHIs are here, performing countless actions on our behalf. Understanding them begins with seeing that every non-human identity represents accountability, not just automation, and approaching it from how NHI management is more than just a technical discipline. It is about ownership and governance across change and access processes. To set up that governance, organisations must recognize where NHIs live in their architecture and assign accountability accordingly.</p>



<p>This article continues the NHI discussion <a href="https://idpro.org/understanding-nhi-part-1/">started in Part 1</a> by examining how non-human identities come into existence, operate, and are decommissioned. Just like human users follow Joiner-Mover-Leaver (JML) logic, NHIs follow their own pattern — one rooted in change management.</p>



<h2 class="wp-block-heading"><strong>Lifecycle of NHIs</strong></h2>



<p>Just like human identities, NHIs have a lifecycle. Somehow, they come to exist, they have a life, and then they are destroyed.</p>



<p>For human identities, the human resource management (HRM) processes are the governing processes. Joiner–Mover–Leaver (JML) is the core model. Every Join, Move, or Leave event will be evaluated for the identity and access management consequences. If an actor joins an organization, a digital identity is created, and one or more accounts or usernames are assigned to this actor. Moving within the organization (to a new department or manager) will result in a reevaluation of permissions. And when leaving, all permissions will have to be revoked and licenses will be terminated, all to prevent the abuse of identities and identity theft.</p>



<p>For non-human identities, a different process is the governing process, not the JML processes. These processes are not HR processes. NHIs don’t apply for a job, nor do they drop out of the sky.</p>



<p>Before NHIs gain access to the network or a building, they must be onboarded. Meaning they should be identifiable as ‘trusted’ components that may get access for a defined purpose. A component has a purpose, a goal in non-human life. Be it a service, a server, a robot, Robotic Process Automation (RPA), or a machine interface. The component is implemented and configured for that purpose. The governing process is a Change Management process, and registration occurs in a configuration management database (CMDB). Reconfiguring the component to serve a different purpose or work in a different environment is possible, but that also requires a change. A financial reporting RPA will not become an invoicing RPA without reconfiguration, not without a change request. And removal of the component, again, takes a change.</p>



<p>So instead of JML, this is Create, Adjust, and Remove. We could refer to this as the CAR processes or, less specifically, change management.</p>



<h2 class="wp-block-heading"><strong>Change Management</strong></h2>



<p>A change management process is more than just the Information Technology Infrastructure Library (ITIL) definition; it’s every change in an infrastructure or application landscape that results in functionality or features needed.</p>



<p>There is always a stakeholder who requests functionality: a tool, a service, or whatever. If the stakeholder has the mandate to do so, a change will be implemented, resulting in a component, service, or thing that can be used by or on behalf of the stakeholder. And, this is key: a change not only results in the component, but also in a governance item, typically the registration in a configuration management database (CMDB). And it is important that the CMDB item affected by the change has an owner and some more documentation, like the permissions needed by the component. We know who requested the component, we know its whereabouts, and we know the permissions.</p>



<p>Changing the functionality or location of the component is possible, but that, again, requires a change request and documentation. This is also valid for all components, including those built dynamically, such as services created in a CI/CD pipeline. The continuous process is a configured process; it has an owner, a build requester. So even those services and APIs are created in a structured and governed manner, and that again is a change management process. And even more, these processes can be part of automation (in CI/CD devops environments) or procurement processes. The changes (such as in the source code and config files) may even be documented in a version control system in highly automated build processes.</p>



<p>When the component is not in use anymore, it will be decommissioned, it must be disabled, removed, or destroyed. When the component has no purpose anymore, the final change is the removal of the component and registering the change in the CMDB. It must not be removed from the CMDB, because it once had its own identity, and for logging, monitoring, and forensics purposes, we need to know the history of the component.</p>



<p>Remember that maintaining the CMDB is an ongoing process; this precondition will not be discussed further.</p>



<p>As a further clarification, the digital identity lifecycle of non-human accounts, as defined in IDPro (see refs) is shown:</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="536" height="394" src="https://idpro.org/wp-content/uploads/2025/12/image.png" alt="" class="wp-image-2921" srcset="https://idpro.org/wp-content/uploads/2025/12/image.png 536w, https://idpro.org/wp-content/uploads/2025/12/image-300x221.png 300w" sizes="(max-width: 536px) 100vw, 536px" /></figure>



<p><strong>Figure 1:</strong> NHI lifecycle</p>



<h2 class="wp-block-heading"><strong>IGA and Authorization</strong></h2>



<p>To automate the Human JML process, the supporting tool is an Identity Governance and Administration (IGA) solution. It evaluates the event in an HR system and, based on rules and roles, provisions accounts and authorizations to connected target systems. And after provisioning, it can also reconcile the target systems to validate accounts and permissions in these target systems.&nbsp;</p>



<p>In this process, the IGA system will encounter accounts and authorizations that have not been generated by the IGA system. IGA will see the admin and root accounts that belong to the target system. These accounts are NHIs, and they exist as a part of the target system. If you implement a new Linux or Windows server, the root or admin account already exists. And, as you will understand, these new servers are the result of a change management process; it’s not a JML event.&nbsp;</p>



<p>After reconciliation (the process of reading back the identity and authorization repositories of a target system), an IGA system will see the root or admin account in the target system, and that’s it. No need to manage admin or root as these accounts have all permissions, as they should have. They will not be related to a human identity. The account belongs to the component, and it also has an owner: the owner of the component. IGA will see the account and report it as ‘not being managed by IGA’, but that’s okay. In most IGA solutions, this type of account can be classified as a system account or service account. In fact, IGA solutions should enable it to be classified as an NHI.</p>



<p>In short, IGA takes care of human access as a result of the human JML process. But where does that leave the NHI’s, how should we manage their lifecycles?&nbsp;</p>



<p>For human identities the lifecycle management process is well defined and IGA systems are well equipped to support that with both account management and role based access control, provisioning and deprovisioning accounts and authorizations. Can the same system also support NHI’s? And then my opinion is that IGA systems should not be the solution to manage the lifecycle of NHI’s. And there are multiple reasons for that. First, there is not just one process responsible for managing NHI’s.&nbsp;</p>



<p>If you treat an NHI as a human identity, some additional controls are inevitable: If you would manage the lifecycle and authorizations of an NHI in en IGA solution, then these effects would be caused by the IGA solution:</p>



<ul class="wp-block-list">
<li>An account is created in the target system through the provisioning process;</li>



<li>In the organizational structure of, not sure, either the org top level structure, or a sub level of the top level, to be defined by the owner? Or Manager or operator?;</li>



<li>The birthright authorizations will be granted for the org top level;</li>



<li>The line manager will see the NHI to grant authorizations by assigning a role.</li>
</ul>



<p>But these provisioning effects have to be undone, because other controls and measures are already in place:</p>



<ul class="wp-block-list">
<li>Account creation has already been done by onboarding the NHI in the network;</li>



<li>There is no need to assign the NHI to an organizational level: in the CMDB or change request the whereabouts of the component is already known;</li>



<li>The NHI shall not have default birthright authorizations or roles, components don’t need birthright authorizations, they only need ‘least privilege’ access;</li>



<li>The NHI doesn’t need a role, it has all the required permissions defined/described in the change. An RPA cannot just get new authorizations by changing the business role in IGA, it needs new functionality, because of the change.</li>
</ul>



<p>And the same will happen for other NHIs: say we configured an RPA. Every day after office hours the RPA will read the sales figures, analyse the data, create a report and send the report to the head of sales. This RPA needs an account, authorisations, and resources to perform these actions. All of this will be configured while creating the NHI.&nbsp;</p>



<p>The NHI will work on behalf of the Head of Sales, but it should not have the authorizations of the Head of Sales. Nor shall it have the business role of the Head of Sales, it only needs the permissions needed to read, analyze, create, and distribute the report. Least privilege. The permissions are very specific. Any other RPA will have different authorizations, no need to make a role for it. Its authorizations are a dedicated, non-reusable set of permissions. And these permissions will not be changed, unless the functionality of the RPA must change, in which case it will be newly developed. RBAC? No way! In fact, if you try to give a role to an NHI, you misunderstand the concept of RBAC… There are better solutions for managing access for NHI’s, like Policy Based Access Control or Relation Based Access Control to add the dynamics required. We will get to that in the next articles in this series.</p>



<h2 class="wp-block-heading"><strong>Life Cycle Conclusion</strong></h2>



<p>NHIs don’t join the organization. NHIs are managed through a change management process. This means that an IGA solution does not fit the NHI lifecycle management process. IGA vendors may tease you in managing NHIs in IGA, but that’s not a sustainable solution.</p>



<p>NHIs must be managed in a change management process, and they should be registered in a CMDB and assigned to an owner.</p>



<h3 class="wp-block-heading"><strong>Reality check</strong></h3>



<p>No, this hardly ever happens. In most organizations any CMDB is not reliable, the registration is, therefore, unreliable. But that should not keep you from managing NHIs in a controllable way. This is a call for fine-tuning the change management and asset management processes.</p>



<p>The organization may decide to implement specific tooling for managing NHIs, that’s all right, but that does not mean that the governance problem can be ignored. There must still be a business owner who is accountable for the life cycle and the authorizations granted. And just implementing additional tools next to the CMDB and service management solutions that are in place could only obfuscate the problem of lack of governance.</p>



<p><strong>Conclusion</strong></p>



<p><br>This lifecycle perspective underlines one essential truth: NHIs are governed through change, not employment. The Access article examines how these identities interact with systems. Specifically, how access “to” and “by” NHIs should be understood and controlled.</p>



<p><strong>References</strong></p>



<p>There are great resources that cover NHIs, but the lifecycle covered in this article are not clearly identified. Anyway, please study these articles in the IDPro Body of Knowledge:</p>



<ul class="wp-block-list">
<li>IDPro: Non-human account management: <a href="https://bok.idpro.org/article/id/52/">https://bok.idpro.org/article/id/52/</a> </li>



<li>IDPro: Digital Identity Lifecycle: <a href="https://bok.idpro.org/article/id/31/">https://bok.idpro.org/article/id/31/</a> </li>
</ul>



<p>The CAR case was invented by my colleague Henk Marsman, feel free to use CAR <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p></p>



<p><em>Disclaimer: The views expressed in the content are solely those of the author and do not necessarily reflect the views of the IDPro organization.</em></p>



<p></p>



<p>About the author:</p>



<figure class="wp-block-image"><img decoding="async" width="400" height="400" src="https://idpro.org/wp-content/uploads/2025/10/andre-koot.png" alt="Headshot - Andre Koot" class="wp-image-2880" srcset="https://idpro.org/wp-content/uploads/2025/10/andre-koot.png 400w, https://idpro.org/wp-content/uploads/2025/10/andre-koot-300x300.png 300w, https://idpro.org/wp-content/uploads/2025/10/andre-koot-150x150.png 150w, https://idpro.org/wp-content/uploads/2025/10/andre-koot-320x320.png 320w" sizes="(max-width: 400px) 100vw, 400px" /></figure>



<p>André Koot is principal IAM consultant at Dutch IAM consultancy and managed services company SonicBee (an IDPro partner). And member of the Advisory Board of IdNext.eu.&nbsp;He has over 30 years of infosec experience and over 20 years of experience as an IAM expert, acting as architect, auditor and program lead. For the last nine years he has taught a 4-day IAM training course. André contributes to the IDPro BoK as committee member, author, and reviewer.</p>



<figure class="wp-block-gallery has-nested-images columns-5 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img decoding="async" width="346" height="350" data-id="2898" src="https://idpro.org/wp-content/uploads/2025/11/image-2.png" alt="" class="wp-image-2898" srcset="https://idpro.org/wp-content/uploads/2025/11/image-2.png 346w, https://idpro.org/wp-content/uploads/2025/11/image-2-297x300.png 297w" sizes="(max-width: 346px) 100vw, 346px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="110" height="110" data-id="2896" src="https://idpro.org/wp-content/uploads/2025/11/image.png" alt="" class="wp-image-2896"/></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="2391" src="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Active_BoK_Reviewer.png" alt="" class="wp-image-2391" srcset="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Active_BoK_Reviewer.png 600w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Active_BoK_Reviewer-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Active_BoK_Reviewer-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Active_BoK_Reviewer-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="1984" src="https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge.png" alt="" class="wp-image-1984" srcset="https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge.png 600w, https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge-300x300.png 300w, https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge-150x150.png 150w, https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="1270" src="https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author.png" alt="" class="wp-image-1270" srcset="https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author.png 600w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>
</figure>
<p>The post <a href="https://idpro.org/understanding-non-human-identities-nhi-part-2-lifecycle/">Understanding Non-Human Identities (NHI) Part 2: Lifecycle</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Real Lifecycle of IAM Projects</title>
		<link>https://idpro.org/the-real-lifecycle-of-iam-projects/</link>
		
		<dc:creator><![CDATA[VTM Web Services]]></dc:creator>
		<pubDate>Mon, 29 Dec 2025 21:15:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[project management]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2916</guid>

					<description><![CDATA[<p>Ideas for IAM work show up in all the usual ways: I won’t say the list is in priority order… [&#8230;]</p>
<p>The post <a href="https://idpro.org/the-real-lifecycle-of-iam-projects/">The Real Lifecycle of IAM Projects</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Ideas for IAM work show up in all the usual ways:</strong></p>



<ul class="wp-block-list">
<li>An executive reads something or talks to a colleague about where the industry is heading.</li>



<li>A leader comes back from a conference energized about “the next big thing.”</li>



<li>The business needs to streamline how they work or unlock revenue.</li>



<li>An IAM team member calls out something that obviously needs improvement.</li>
</ul>



<p>I won’t say the list is in priority order… but it’s close.</p>



<p>And more importantly: that’s <em>just</em> how the idea arrives—<strong>not how it gets funded, approved, or actually done</strong>.</p>



<p>So how does something move from idea into reality?</p>



<h2 class="wp-block-heading"><strong>IAM Project Momentum Model — Reference Card</strong></h2>



<p><strong>1. Policy</strong></p>



<p>Does policy already support the need?</p>



<p>If yes → you have built-in leadership intent.</p>



<p>If no → clarify policy language so the need becomes undeniable.</p>



<p><strong>Momentum Source:</strong> documented executive stance + audit alignment.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>2. Process</strong></p>



<p>Where is the process failing, outdated, or not meeting policy intent?</p>



<p>Look for gaps caused by new technology, business changes, or legacy workflows.</p>



<p><strong>Momentum Source:</strong> operational inefficiency + risk mitigation.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>3. People</strong></p>



<p>Do you have the skills today to execute the project?</p>



<p>If not, can training or restructuring solve it?</p>



<p>Leadership rarely hires for future problems—scope realistically.</p>



<p><strong>Momentum Source:</strong> team capability + future-proofing.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>4. Tools</strong></p>



<p>Tools come last—after policy, process, and people are aligned.</p>



<p>Ask: does the tool meet policy needs, fix process gaps, and elevate skills?</p>



<p><strong>Momentum Source:</strong> accelerators, not the foundation.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>“The strongest IAM projects build momentum in this order:</p>



<p><strong>Policy → Process → People → Tools.</strong></p>



<p>Skip the order, and momentum breaks down.”</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Momentum: The First Gate</strong></h2>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>A project needs momentum. It has to catch a wave, or roll downhill like a snowball.</p>



<p>Your position in the hierarchy determines how easily you can create momentum, what tools you have, and how much help you need.</p>



<p>Executives and senior leaders have experience (also called trial and error). They know the fastest path, they know who to talk to, and they’ve built trust. They still have to check the boxes to activate a project, but they get flexibility because leadership assumes they’ll finish the details. It’s basically a good line of credit.</p>



<p>The business or IAM staff?</p>



<p>We have more obstacles. Our job is to <em>earn</em> momentum. One way is getting buy-in from those executives and leaders—turning <strong>your idea into their idea</strong>.</p>



<p>But how?</p>



<p>By showing your work clearly.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>1. Policy: The First Source of Natural Momentum</strong></p>



<p>Ask first: does policy already support this?</p>



<p>If yes, you have documented leadership intent behind you.</p>



<p>If not, your first job is clarifying the policy so the need becomes unavoidable. If audits or controls testers are already raising concerns, momentum is forming all by itself.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>2. Process: The Second Momentum Check</strong></p>



<p>If policy is solid, look at where the process fails:</p>



<ul class="wp-block-list">
<li>Outdated workflows</li>



<li>Gaps caused by evolving tech</li>



<li>Steps stuck in “the way we’ve always done it”</li>
</ul>



<p>If the policy is still valid but the process is behind, you have a legitimate need to drive change.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>3. People: The Hardest Momentum to Build</strong></p>



<p>Skill gaps matter. You can’t build a project the team has no ability to execute.</p>



<p>Sometimes you can train.</p>



<p>Sometimes you need restructuring.</p>



<p>Sometimes you have to scope the project down until hiring or attrition lets you rebuild the skills you’ll need later.</p>



<p>Leadership rarely hires for a <em>future</em> problem—so break the work into achievable phases and plan ahead.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>4. Tools: Everyone’s Favorite Step (Which Should Be Last)</strong></p>



<p>Tools get the attention because they’re exciting and vendors are loud. But tools must match the needs you discover in the first three steps, not the other way around.</p>



<p>When evaluating tools, ask:</p>



<ul class="wp-block-list">
<li>Does it meet policy intent?</li>



<li>Does it modernize or fix process gaps?</li>



<li>Does it bridge skills or provide a path to grow them?</li>



<li>Is the vendor stable, innovative, and able to deliver on time?</li>
</ul>



<p>Tool selection should be the <em>result</em> of the earlier steps—not the beginning.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>The Real Momentum Curve</strong></h2>



<p>Working from <strong>Policy → Process → People → Tools</strong> gives you the strongest possible foundation.</p>



<p>The common trap is gaining <em>just enough</em> momentum to start and then stopping. That’s how projects lose funding, lose leadership attention, get paused, get mothballed, or get handed to people who don’t share the original vision.</p>



<p>A year later you find yourself asking, “How did this happen?”</p>



<p><em>Disclaimer: The views expressed in the content are solely those of the author and do not necessarily reflect the views of the IDPro organization.</em></p>



<p></p>



<figure class="wp-block-image size-medium"><img loading="lazy" decoding="async" width="300" height="300" src="https://idpro.org/wp-content/uploads/2025/12/image-1-300x300.jpeg" alt="" class="wp-image-2917" srcset="https://idpro.org/wp-content/uploads/2025/12/image-1-300x300.jpeg 300w, https://idpro.org/wp-content/uploads/2025/12/image-1-150x150.jpeg 150w, https://idpro.org/wp-content/uploads/2025/12/image-1-768x768.jpeg 768w, https://idpro.org/wp-content/uploads/2025/12/image-1-320x320.jpeg 320w, https://idpro.org/wp-content/uploads/2025/12/image-1.jpeg 800w" sizes="auto, (max-width: 300px) 100vw, 300px" /></figure>



<p>Chris Power is an IT leader with over 25 years of experience across infrastructure, application delivery, and enterprise systems, with the last five years focused on Identity and Access Management. He currently serves as Senior Manager of IAM Operations at Sallie Mae, where he leads teams responsible for delivering and governing workforce identity services in a highly regulated financial environment.Chris focuses on building IAM programs that work at scale—balancing control, usability, and operational sustainability. His leadership perspective centers on daily workforce provisioning, access governance, and the automation required to support growing organizations without increasing risk or operational drag. He is particularly interested in how clear ownership, decision rights, and accountability models shape successful IAM outcomes. He writes and speaks from the perspective of a leader who has spent decades running systems and teams, and now applies those lessons to building resilient, auditable, and people-centered identity operations.</p>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="346" height="350" data-id="2898" src="https://idpro.org/wp-content/uploads/2025/11/image-2.png" alt="" class="wp-image-2898" srcset="https://idpro.org/wp-content/uploads/2025/11/image-2.png 346w, https://idpro.org/wp-content/uploads/2025/11/image-2-297x300.png 297w" sizes="auto, (max-width: 346px) 100vw, 346px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="110" height="110" data-id="2896" src="https://idpro.org/wp-content/uploads/2025/11/image.png" alt="" class="wp-image-2896"/></figure>
</figure>
<p>The post <a href="https://idpro.org/the-real-lifecycle-of-iam-projects/">The Real Lifecycle of IAM Projects</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Identity of Everything… Else</title>
		<link>https://idpro.org/the-identity-of-everything-else/</link>
		
		<dc:creator><![CDATA[VTM Web Services]]></dc:creator>
		<pubDate>Thu, 04 Dec 2025 19:51:37 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2903</guid>

					<description><![CDATA[<p>This article is about “identity.” However, this is explicitly not about user accounts and what some may call “digital identities”. [&#8230;]</p>
<p>The post <a href="https://idpro.org/the-identity-of-everything-else/">The Identity of Everything… Else</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>This article is about “identity.”</p>



<p>However, this is explicitly <em>not </em>about user accounts and what some may call “digital identities”. It’s also not about non-human identities (NHIs), workload, service, machine-to-machine, or customer accounts.&nbsp;</p>



<p>There are a lot of great articles already written on each and every one of these identity types by thought leaders, so I’d like to address the neglected others.</p>



<p>So, if this article is about identities, but none of the above, then what’s this article about? This is about other constructs that are fundamental to all Identity and Access Management programs, and to their related tools and applications. I’m referring to the identities of constructs like groups, applications, policies, networks, etc.</p>



<h2 class="wp-block-heading"><strong>Identity Constitution</strong></h2>



<p>Allow me to simplify the constitution of ‘Identity’ into having three parts: </p>



<ol class="wp-block-list">
<li>An identifier (as unique as possible)</li>



<li>Attributes, which provide further differentiation, context, etc.</li>



<li>Relationships (e.g., “belongs to”), which can be documented as part of #2</li>
</ol>



<p>“My dog’s name is Lola” ← These five words already encompass the three parts above:</p>



<ol class="wp-block-list">
<li>Her identifier: Lola</li>



<li>Attributes: type: Dog</li>



<li>Relationships: owner: Me (although, if Lola could talk, she’d tell you her human is my wife)</li>
</ol>



<p>An example of a non-living object is “my lucky t-shirt”. I’ve had this t-shirt for years, and it’s green, and it has a print of mountains with “Colo ‘rad’ o” written above (I’m a dad, I love it). At home, I may say, “have you seen my lucky t-shirt?”, and in the context of my family, chances are they’d know which one I’m talking about. If my daughter is not sure which t-shirt I’m talking about, she may ask, “what color is it?” (It’s green, an attribute). Life gives us an extensible schema to define any number of attributes to identify objects.</p>



<p>In the examples above, I shared the ‘Identities’ of two objects. The point is to ‘identify’ them.</p>



<p>If we turn to IAM-related objects, we can look at groups as in immediate need of proper identification. A group’s system identifier may be “xyz123”, attributes may include Group Name = “App X Users” (this may be considered the identifier, to the human eyes at least), and Group Description = “Accounts with access to App X”. Is this sufficient? Perhaps initially you’ll think “absolutely”. I’d argue that there’s a rich group identity hidden behind the ID, Name, and Description for this group. </p>



<p>The IAM systems I’m most familiar with allow me to define a rich, extensible schema for accounts with many different attributes and even different attribute-types (string, Boolean, array, etc). This is excellent and much needed. In the last few years, the ‘group schema’ became available, so I may now define a Boolean value ‘For SSO’, ‘For SCIM Provisioning’, or ‘For Policy’. In addition, I want to define ‘Pushed to App’ as a Boolean value, and if TRUE, then ‘App’ (string type, as I can’t define an App object relationship).</p>



<p>But, there’s no extensible schema for ‘Apps’, or for ‘Group Rules’, or ‘Policies’, or ‘Networks’, etc. Lots of opportunities here to elevate the schemas of other objects to a whole new level.&nbsp;</p>



<h2 class="wp-block-heading"><strong>The CMDB is an Identity Management system</strong></h2>



<p>It follows that the system of record for constructs such as applications, systems, and perhaps groups is actually an IAM system, but for constructs other than accounts.</p>



<p>A proper CMDB will contain the creation date for any of its configuration items (CIs), its reason for being, its location, and, importantly, its relationships to other CIs.</p>



<h3 class="wp-block-heading"><strong>A Source of Truth</strong></h3>



<p>One way to make your IAM system compliant and elevate its security is to delegate account creation to the correct source of truth. HR-driven provisioning is one example of this. If the IAM system delegates employee account creation to a correlated HR record, and the permissions to create accounts are removed from humans, a bad actor would have to shift their tactics to the HR system in order to create an account, which would likely require creating a role requisition, an applicant account, and then a hire/onboarding process.</p>



<p>Similarly, if the base attributes for a group, application, or other IAM construct are established and properly governed by the right source of truth, then the entire identity fabric will be more secure and compliant, but it’ll be like a self-maintaining organism, keeping the parts that are needed and auto-shedding those that have come to the end of their useful existence. </p>



<h2 class="wp-block-heading"><strong>Naming Conventions Don’t Work</strong></h2>



<p>You’ve likely implemented or have seen many naming conventions implemented to address this very topic. In my experience, a naming convention typically encodes attributes into the name (perhaps into a `Description`) with the intent to give more context to the object. This may work in some situations and it may help humans visually inspect the object. The problem begins when these existing encoded dimensions change or no longer capture the entirety of the object’s schema. When faced with this challenge, proper hygiene means renaming all existing objects, or, in the more common scenario, breaking the naming convention altogether. The end result is heterogeneous names and paralysis due to confusion and the need to research.</p>



<h2 class="wp-block-heading"><strong>Suggested Actions</strong></h2>



<p>If you have access to an extensible schema for your objects, use it. Give those objects a rich identity that empowers a complete lifecycle of the object, from creation to decommissioning.</p>



<p>In the case of our Lola, she has her tag on her collar with her name and our cell phone numbers. However, she also has a microchip that extends the schema of her attributes to include our details, her vaccinations, etc. in case she gets lost and loses her collar.</p>



<p>If you’re building or managing IAM software, expand the universe to enable rich schemas in the system. Some of us may want to have a “lucky” group/policy/agent, and we certainly want better ways to identify and protect our Lola’s.</p>



<p></p>



<p><em>Disclaimer: The views expressed in the content are solely those of the author and do not necessarily reflect the views of the IDPro organization.</em></p>



<p></p>



<h2 class="wp-block-heading">About the author</h2>



<div class="wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex">
<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="400" height="400" src="https://idpro.org/wp-content/uploads/2025/12/image.jpeg" alt="" class="wp-image-2904" srcset="https://idpro.org/wp-content/uploads/2025/12/image.jpeg 400w, https://idpro.org/wp-content/uploads/2025/12/image-300x300.jpeg 300w, https://idpro.org/wp-content/uploads/2025/12/image-150x150.jpeg 150w, https://idpro.org/wp-content/uploads/2025/12/image-320x320.jpeg 320w" sizes="auto, (max-width: 400px) 100vw, 400px" /></figure>



<p>Pablo Valarezo is an Identity practitioner building and modernizing secure IAM programs over the last decade. His primary focus has been in the workforce side of IAM. He came to Information Security via system administration, project management, and audit and compliance.</p>
</div>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="346" height="350" data-id="2898" src="https://idpro.org/wp-content/uploads/2025/11/image-2.png" alt="" class="wp-image-2898" srcset="https://idpro.org/wp-content/uploads/2025/11/image-2.png 346w, https://idpro.org/wp-content/uploads/2025/11/image-2-297x300.png 297w" sizes="auto, (max-width: 346px) 100vw, 346px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="2390" src="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png" alt="" class="wp-image-2390" srcset="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png 600w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>
</figure>
<p>The post <a href="https://idpro.org/the-identity-of-everything-else/">The Identity of Everything… Else</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk

Served from: idpro.org @ 2026-04-02 07:01:57 by W3 Total Cache
-->