Skip links

Top 20 AM Tool Features Part 3


In this week’s article, we continue our series of posts where we examine the top features to look for in a modern identity and access management system. We started with access management, but plan on doing later installments on identity management and directories. If you have any questions or comments, feel free to send us your thoughts at and maybe you’ll change our minds on the order!

For maximum excitement and anticipation, we have gone with a top 20 list and will do 5 entries per post. Think you know the top 5? Let us know and there could be a prize in it for the people who guess the order correctly. Having shared 15 through 11 last time, here are the next 5:

10. Monitoring

Proactive troubleshooting and avoiding negative customer experiences are key to successful enterprise identity management. Using multi-level monitoring solutions leads to the best results and your access management system will need to provide interfaces and/or data to accommodate them.

9. Audit

Automated reporting for users and applications to support compliance and governance are required in most organizations. Audit data can also be used in troubleshooting, so having high quality, customizable audit data is a key feature to look for in an IdM system.

8. Authentication Models

Broad support for various authentication approaches such as:

  • Federated (SAML, OIDC, WS-Fed)
  • Custom
  • Standards based (X.509, basic)
  • Two Factor/Multifactor

Supporting a wide variety of authentication models allows the product to support a wider array of applications within the enterprise.

7. Impersonation

Provides the ability to allow customer service representatives to directly support customers, while not compromising security. Customer service representatives can see what the users are experiencing without the exchange of passwords or tokens.


6. User Store Support

Broad user store support (database, LDAP, AD, custom, etc.) allows users to be authenticated and authorized from distributed and distinct repositories. Enterprises often store different user types in different repositories; a product that supports different user stores can eliminate the need to aggregate them for authentication and authorization.

As always, we hope that you have found this information useful. If you need IAM assistance, reach out to SIS today and we would be happy to assist you. And subscribe to our newsletter to be notified about the posting of future articles and other SIS news.



If you want to know our recent offer please subscribe to our newsletter