Share via


Introduction to IAM Buyer's Guide

“Our vision for security is to create a world where there is greater trust — where people and organizations can use a range of devices to be more reliably and securely connected to the information, services and people that matter most to them.” - Bill Gates, Chairman, Microsoft

“As a CIO, I strive to ensure productive, secure, cost effective solutions that help our users realize their potential. Identity and Access Management is the foundation for any solution that I provide to our users.” - Ron Markezich, VP, Microsoft

Thank you for visiting my weblog. Please scroll down because I'll keep the Introduction page at top.

Audiences: CIOs, CSOs, IT Directors/Managers, Enterprise/IT Architects, IT Pros, PMs, Consultants, IAM Product Vendors, Developers

Purpose: To share my personal view and experience on how Identity & Access Management (IAM, also referred as IdM or IdA) should be done in enterprise IT B2E (Business to Employees) environment (up to half million seats and one million nodes globally). Unlike most other IAM Internet sites, I do not sell products or services. I see IAM from a buyer's angle rather than from a seller's angle. My goal is to purely share information and benefit other enterprise IT divisions / departments to improve security, increase productivity, minimize cost, and satisfy regulatory compliance in long term. Hopefully, this will also set an IT requirements bar for IAM product vendors.

Yale Li, PMP, CISSP, ITIL, CCNA, MCSE+I, MCSD, MCDBA, MCNE, CLP, CWSE, CLSE, CNP, CCP, ASE

Disclaimer: All opinions posted here are those of the author and are in no way intended to represent the opinions of author's employer. This posting is provided "AS IS" with no warranties, and confers no rights. Use of included code samples are subject to the terms specified at https://www.microsoft.com/info/cpyright.htm