<s>
In	O
information	O
systems	O
,	O
identity	B-Application
correlation	I-Application
is	O
a	O
process	O
that	O
reconciles	O
and	O
validates	O
the	O
proper	O
ownership	O
of	O
disparate	O
user	O
account	O
login	O
IDs	O
(	O
user	O
names	O
)	O
that	O
reside	O
on	O
systems	O
and	O
applications	O
throughout	O
an	O
organization	O
and	O
can	O
permanently	O
link	O
ownership	O
of	O
those	O
user	O
account	O
login	O
IDs	O
to	O
particular	O
individuals	O
by	O
assigning	O
a	O
unique	O
identifier	O
(	O
also	O
called	O
primary	O
or	O
common	O
keys	O
)	O
to	O
all	O
validated	O
account	O
login	O
IDs	O
.	O
</s>
<s>
The	O
process	O
of	O
identity	B-Application
correlation	I-Application
validates	O
that	O
individuals	O
only	O
have	O
account	O
login	O
IDs	O
for	O
the	O
appropriate	O
systems	O
and	O
applications	O
a	O
user	O
should	O
have	O
access	O
to	O
according	O
to	O
the	O
organization	O
's	O
business	O
policies	O
,	O
access	O
control	O
policies	O
and	O
various	O
application	O
requirements	O
.	O
</s>
<s>
A	O
unique	O
identifier	O
,	O
in	O
the	O
context	O
of	O
identity	B-Application
correlation	I-Application
,	O
is	O
any	O
identifier	O
which	O
is	O
guaranteed	O
to	O
be	O
unique	O
among	O
all	O
identifiers	O
used	O
for	O
a	O
group	O
of	O
individuals	O
and	O
for	O
a	O
specific	O
purpose	O
.	O
</s>
<s>
Random	B-Algorithm
numbers	I-Algorithm
,	O
selected	O
from	O
a	O
number	O
space	O
much	O
larger	O
than	O
the	O
maximum	O
(	O
or	O
expected	O
)	O
number	O
of	O
objects	O
to	O
be	O
identified	O
.	O
</s>
<s>
For	O
the	O
purposes	O
of	O
identity	B-Application
correlation	I-Application
,	O
a	O
unique	O
identifier	O
is	O
typically	O
a	O
serial	O
number	O
or	O
random	B-Algorithm
number	I-Algorithm
selected	O
from	O
a	O
number	O
space	O
much	O
larger	O
than	O
the	O
maximum	O
number	O
of	O
individuals	O
who	O
will	O
be	O
identified	O
.	O
</s>
<s>
Identity	B-Application
Correlation	I-Application
involves	O
several	O
factors	O
:	O
</s>
<s>
In	O
this	O
example	O
,	O
she	O
could	O
still	O
be	O
mjones	O
in	O
Active	B-Protocol
Directory	I-Protocol
and	O
mj5678	O
in	O
RACF	B-Application
.	O
</s>
<s>
Identity	B-Application
correlation	I-Application
should	O
link	O
the	O
appropriate	O
system	O
account	O
login	O
IDs	O
to	O
individuals	O
who	O
might	O
be	O
indistinguishable	O
,	O
as	O
well	O
as	O
to	O
those	O
individuals	O
who	O
might	O
appear	O
to	O
be	O
drastically	O
different	O
from	O
a	O
system-by-system	O
standpoint	O
,	O
but	O
should	O
be	O
associated	O
with	O
the	O
same	O
individual	O
.	O
</s>
<s>
User	O
data	B-General_Concept
inconsistencies	I-General_Concept
can	O
also	O
occur	O
due	O
to	O
simple	O
manual	O
input	O
errors	O
,	O
non-standard	O
nomenclature	O
,	O
or	O
name	O
changes	O
that	O
might	O
not	O
be	O
identically	O
updated	O
across	O
all	O
systems	O
.	O
</s>
<s>
The	O
identity	B-Application
correlation	I-Application
process	O
should	O
take	O
these	O
inconsistencies	O
into	O
account	O
to	O
link	O
up	O
identity	O
data	O
that	O
might	O
seem	O
to	O
be	O
unrelated	O
upon	O
initial	O
investigation	O
.	O
</s>
<s>
At	O
the	O
same	O
time	O
,	O
each	O
new	O
application	O
that	O
is	O
added	O
has	O
the	O
potential	O
to	O
produce	O
a	O
new	O
completely	O
unique	O
user	B-Application
ID	I-Application
.	O
</s>
<s>
An	O
identity	B-Application
correlation	I-Application
process	O
must	O
identify	O
all	O
orphan	O
or	O
defunct	O
account	O
identities	O
that	O
no	O
longer	O
belong	O
from	O
such	O
drastic	O
shifts	O
in	O
an	O
organization	O
's	O
infrastructure	O
.	O
</s>
<s>
If	O
implemented	O
correctly	O
,	O
identity	B-Application
correlation	I-Application
will	O
expose	O
compliance	O
issues	O
.	O
</s>
<s>
For	O
companies	O
that	O
have	O
not	O
already	O
fully	O
implemented	O
an	O
enterprise	O
identity	O
management	O
solution	O
,	O
identity	B-Application
correlation	I-Application
and	O
validation	O
is	O
required	O
to	O
adequately	O
attest	O
to	O
the	O
true	O
state	O
of	O
an	O
organization	O
's	O
user	O
base	O
.	O
</s>
<s>
Part	O
of	O
the	O
identity	B-Application
correlation	I-Application
process	O
infers	O
that	O
each	O
particular	O
data	O
source	O
will	O
need	O
to	O
be	O
compared	O
against	O
an	O
authoritative	O
data	O
source	O
to	O
ensure	O
consistency	B-General_Concept
and	O
validity	O
against	O
relevant	O
corporate	O
policies	O
and	O
access	O
controls	O
.	O
</s>
<s>
Any	O
such	O
comparison	O
that	O
involves	O
an	O
exposure	O
of	O
enterprise-wide	O
,	O
authoritative	O
,	O
HR-related	O
identity	O
data	O
will	O
require	O
various	O
non-disclosure	O
agreements	O
either	O
internally	O
or	O
externally	O
,	O
depending	O
on	O
how	O
an	O
organization	O
decides	O
to	O
undergo	O
an	O
identity	B-Application
correlation	I-Application
exercise	O
.	O
</s>
<s>
Because	O
authoritative	O
data	O
is	O
frequently	O
highly	O
confidential	O
and	O
restricted	O
,	O
such	O
concerns	O
may	O
bar	O
the	O
way	O
from	O
performing	O
an	O
identity	B-Application
correlation	I-Application
activity	O
thoroughly	O
and	O
sufficiently	O
.	O
</s>
<s>
Manual	O
efforts	O
to	O
accomplish	O
identity	B-Application
correlation	I-Application
require	O
a	O
great	O
deal	O
of	O
time	O
and	O
people	O
effort	O
,	O
and	O
do	O
not	O
guarantee	O
that	O
the	O
effort	O
will	O
be	O
completed	O
successfully	O
or	O
in	O
a	O
compliant	O
fashion	O
.	O
</s>
<s>
Because	O
of	O
this	O
,	O
automated	O
identity	B-Application
correlation	I-Application
solutions	O
have	O
recently	O
entered	O
the	O
marketplace	O
to	O
provide	O
more	O
effortless	O
ways	O
of	O
handling	O
identity	B-Application
correlation	I-Application
exercises	O
.	O
</s>
<s>
Typical	O
automated	O
identity	B-Application
correlation	I-Application
solution	O
functionality	O
includes	O
the	O
following	O
characteristics	O
:	O
</s>
<s>
Identity	B-Application
correlation	I-Application
solutions	O
can	O
be	O
implemented	O
under	O
three	O
distinct	O
delivery	O
models	O
.	O
</s>
<s>
Identity	B-Application
Correlation	I-Application
as	O
a	O
Service	O
(	O
ICAS	O
)	O
–	O
ICAS	O
is	O
a	O
subscription-based	O
service	O
where	O
a	O
client	O
connects	O
to	O
a	O
secure	O
infrastructure	O
to	O
load	O
and	O
run	O
correlation	O
activities	O
.	O
</s>
<s>
This	O
offering	O
provides	O
full	O
functionality	O
offered	O
by	O
the	O
identity	B-Application
correlation	I-Application
solution	O
without	O
owning	O
and	O
maintaining	O
hardware	O
and	O
related	O
support	O
staff	O
.	O
</s>
<s>
Turn-Key	O
Identity	B-Application
Correlation	I-Application
–	O
A	O
Turn-key	O
methodology	O
requires	O
a	O
client	O
to	O
contract	O
with	O
and	O
provide	O
data	O
to	O
a	O
solutions	O
vendor	O
to	O
perform	O
the	O
required	O
identity	B-Application
correlation	I-Application
activities	O
.	O
</s>
<s>
Related	O
or	O
associated	O
topics	O
which	O
fall	O
under	O
the	O
category	O
of	O
identity	B-Application
correlation	I-Application
may	O
include	O
:	O
</s>
