Most companies have a combination of systems, both Windows and Unix, and a mishmash of others like mainframes and...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
specific systems, such as PeopleSoft, which is used exclusively for HR administration (and now owned by Oracle Corp.). The goal is to have a single product that allows the setup of authentication credentials for these diverse systems from a single point.
In recent years, individual identity and access management products have been bought up by large IT vendors and bundled together into identity and access management suites. User provisioning and SSO are some of the most in-demand features of IAM suites.
For PeopleSoft, two of the major access management vendors are Sun Microsystems Inc. and Oracle. Sun has a PeopleSoft Component Interface for programmatically provisioning user accounts using Java. Oracle, another big player in the IAM suite market, in September released its Oracle Identity Manager Connector for PeopleSoft. This connector adds PeopleSoft to the list of applications that can be provisioned with Oracle Identity Manager.
Similar products are also available from IBM Corp., BMC Software Inc. and CA Inc. These same IAM suites that are players for user provisioning also offer SSO, which can integrate with PeopleSoft and Unix.
For more information:
- Learn more about the prerequisites for implementing single sign-on (SSO) in an organization.
- Is it possible to support users to have their own IDs with root privilege so they aren't sharing a root password. Read more.
Dig Deeper on Privileged access management
Related Q&A from Joel Dubin
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ...continue reading
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well ...continue reading
If a hacker gains control of a router and then uploads a new configuration opening ports up for communication, it may be possible to place a rootkit ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.