Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

This content has been archived and is no longer being updated.

Links may not function; however, this content may be relevant to outdated versions of the product.

Identity Management and Single Sign-On Overview

Updated on September 13, 2021

This presentation is part of the Authentication Overview Self-Study Course.

Transcript

Modern enterprises run a complex array of IT infrastructure, including:

  • Servers and directories
  • HR, payroll, and contract management systems
  • Line-of-business applications
  • CRM and e-commerce applications

Every such system must track valid users and control what they can and cannot see or do.  The diversity of systems - each with their own administration software, people and processes and the fact that users typically have access to multiple systems - makes managing access control difficult at best.

Several discrete types of technologies are available to manage user identity data across the enterprise. These technologies include

  • Directories
  • Web access management
  • Password management
  • Single sign-on solutions

Enterprise Identity Management (EIM) systems combine the features of most of these technologies and provide solutions for centralized account and password management and automated access to a variety of applications.

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us