To meet the challenges of today’sworld,competitive companies need toincreasetheir
business agility in a secure environmentand need to enforcethe performance of theirIT infrastructure. With the development of e-business,enterprises now require new methodsto manage secure access to informationand applications across multiple systems, delivering on-line services toemployee, customer and suppliers without compromising security. Companiesmust be able to trust the identities of users requiring access and easilyadminister user identities in a cost-effective way.During these last two years, anemerging concept:the Identity and AccessManagement(I&AM) solutionhas been developed, based on the users andaccess rights management through an integrated,efficient and centralizedinfrastructure.This conceptcombines business processes, policies andtechnologies that enable companiesto: providesecure access to any resource, • efficientlycontrol thisaccess, • respond faster to changing relationships, • protectconfidential information from unauthorized users.