- Enterprise Architecture
- Cloud Computing
- Enterprise Management
- Product Lifecycle
- Real-time & Embedded Systems
- Semantic Interoperability
- Service-Oriented Architecture
The authentication of identities is an essential requirement in information security solutions. The efficient and secure management of identity information is a critical prerequisite for safe and secure operations in enterprise IT systems.
Activities in The Open Group identity management area focus on promoting effective, open standards-based identity management to ensure that the right information reaches the right people, and to bar unauthorized access.
The Open Group provides a vendor-neutral environment where members can grow professionally, network with a world-class community of experts and peers, and lead the development of industry standards and best practices for identity management.
We welcome the participation of all who want to influence the direction and work of The Open Group in the area of identity management.
Past publications on identity management are available, including:-
The above and other Identity Management publications are available for download from our online Publications Catalog
See recent Identity Management publications and development activities here.
Today’s requirements for Identity & Access Management (IAM) demand fine granularity – both in authenticating identity and authorizing different levels of access rights. Current work is underway in: