The traditional view of identity management in physical security is managing employees, contractors, and visitors building by building. However, over the years, as security needs and threat have grown in complexity, this static location-based approach to identity management no longer worked; creating identity data scattered across multiple buildings and siloed in multiple systems such as physical access control, badging, and visitor management.
To address this, many organizations began adopting a seemingly more flexible role-based approach – creating identity profiles to apply rules based on a person’s role in or relationship with an organization. However, some organizations are now realizing that role-based is not as flexible as it seems and does not reflect the complexity of how modern organizations operate.
So, if neither location-based nor role-based identity management meets the needs of today’s organizations, what approach does? The answer is stakeholder-based identity management, which combines aspects of both the location and role-based approaches but adds an additional layer – utilizing trusted stakeholder groups to extend identity management across the entire enterprise.
Join HID Global for this 1-hour webinar where you will learn:
- Different types of identity management
- The benefits of stakeholder-based identity management vs. examples of location/role-based security
- How to implement stakeholder-based identity management