Today’s IT environment is a mixed bag of legacy systems, hosted applications, and enterprise software with their own authentication and authorization mechanisms. What if there was one logon id and password per user for all applications. Even better, what if the management of user privileges are centralized and automated. It sure is possible but comes with a hefty price tag and inherent complexity.
|