by Akber Choudhry
Identity analysis and structure is the cornerstone of any collaboration system. Some questions that need to be asked are:
- Who are the people that are required to collaborate, and any possible groupings?
- What is the level of their attachment to the host organisation, and which organisations do they belong to?
- Do we need to verify actual identities, or are virtual identities good enough?
- What is the mechanism of verifying their real or virtual identity?
- What is the least obstructive authentication method for their role in the collaboration?
- What amount of identity information needs to be stored?
- What are the processes for provisioning and de-provisioning of entitlement, and what is the cost of these processes as opposed to their benefit?
Many other questions will be raised in specific situations, but the spectrum of collaboration activities (polls, surveys, blogs, forums, applications etc.) will build upon the identity management, authentication, authorisation and provisioning structures that have been set up keeping in mind the desired business objectives.