{"id":47081,"date":"2025-01-31T14:04:13","date_gmt":"2025-01-31T13:04:13","guid":{"rendered":"https:\/\/www.firstware.com\/?p=47081"},"modified":"2025-02-03T15:12:12","modified_gmt":"2025-02-03T14:12:12","slug":"iam-guide","status":"publish","type":"post","link":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/","title":{"rendered":"Our IAM guide to preparing for an identity and access management project"},"content":{"rendered":"<p>The introduction of an Identity &amp; Access Management (IAM) system is indispensable for companies that want to meet the challenges of digitalization. While some companies already know exactly what they want, others are often faced with the question of where to start.<\/p>\n<p>This article highlights the different starting points and shows how a <strong>structured IAM guide<\/strong> can help to successfully implement an IAM project.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Index<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#Scenario-1-Companies-with-a-clear-vision\" >Scenario 1: Companies with a clear vision<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#Scenario-2-Companies-without-clear-objectives\" >Scenario 2: Companies without clear objectives<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#Why-is-IAM-so-important\" >Why is IAM so important?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#The-four-most-important-steps-for-introducing-IAM\" >The four most important steps for introducing IAM<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#Analysis-of-the-status-quo\" >Analysis of the status quo<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#Definition-of-requirements\" >Definition of requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#Planning\" >Planning<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#Proof-of-concept-PoC\" >Proof of concept (PoC)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#Conclusion-The-right-partner-makes-all-the-difference\" >Conclusion: The right partner makes all the difference<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#More-about-FirstWare-IDM-Portal\" >More about FirstWare IDM-Portal<\/a><\/li><\/ul><\/nav><\/div>\n\n<h2><span class=\"ez-toc-section\" id=\"Scenario-1-Companies-with-a-clear-vision\"><\/span>Scenario 1: Companies with a clear vision<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Some companies know exactly what they want from an IAM system. They have defined their goals, identified the relevant user groups and know how they want to optimize their identity and access management. For these companies, the focus is clear: it&#8217;s all about implementation.<\/p>\n<p>What is important here is to find a partner who can ensure seamless integration into existing IT infrastructures and offer a future-proof solution.<\/p>\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener\"><button class=\"ButtonBeratung2 aligncenter\">Contact our team<\/button><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Scenario-2-Companies-without-clear-objectives\"><\/span>Scenario 2: Companies without clear objectives<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/firstware.com\/wp-content\/uploads\/2025\/01\/IAM-guide-from-FirstAttribute.pdf\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"imgshadow alignleft wp-image-47098\" title=\"IAM guide from FirstAttribute AG\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2025\/01\/IAM-guide-FirstAttribute-207x300.jpg\" alt=\"IAM guide from FirstAttribute AG\" width=\"237\" height=\"343\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2025\/01\/IAM-guide-FirstAttribute-207x300.jpg 207w, https:\/\/www.firstware.com\/wp-content\/uploads\/2025\/01\/IAM-guide-FirstAttribute.jpg 618w\" sizes=\"(max-width: 237px) 100vw, 237px\" \/><\/a>However, many companies often don&#8217;t know where to start. <br \/>\nThis is where we at FirstAttribute AG come in with our <strong>IAM guide<\/strong>, which takes companies step by step through the project-preparatory as-is analysis.<\/p>\n<p>This analysis is the key to the project&#8217;s success. Without a clear understanding of the starting point, requirements, goals and resources cannot be precisely defined.<\/p>\n<p>We have put together a few questions that provide important clues for selecting a suitable IAM solution.<\/p>\n<p><a href=\"https:\/\/firstware.com\/wp-content\/uploads\/2025\/01\/IAM-guide-from-FirstAttribute.pdf\" target=\"_blank\" rel=\"noopener\"><button class=\"ButtonBeratung aligncenter\">Download IAM guide here<\/button><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why-is-IAM-so-important\"><\/span>Why is IAM so important?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In today&#8217;s business world, companies are facing growing demands to <strong>efficiently manage the multitude of identities and authorisations<\/strong>. This challenge is becoming increasingly complex, particularly due to the increasing networking and collaboration in the cloud.<\/p>\n<p>That is why we no longer speak of classic identity management, but of <strong>distributed identities<\/strong>. Employees and external contacts have long been spread across many different systems, and centralised management of all identities is not always practical or desirable. This makes it all the more important to analyse exactly <strong>which identities are to be managed in which systems<\/strong> and where <strong>potential for efficiency gains<\/strong> lies.<\/p>\n<p>A well-implemented IAM system not only improves efficiency, but also protects sensitive data and systems. At the same time, it optimises the user experience \u2013 be it for employees, customers or partners.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The-four-most-important-steps-for-introducing-IAM\"><\/span>The four most important steps for introducing IAM<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li>\n<h3 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Analysis-of-the-status-quo\"><\/span>Analysis of the status quo<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The first step is a thorough analysis of the current situation. Companies should answer the following questions:<\/p>\n<ul>\n<li>What identities and user groups are there (e.g. employees, customers, suppliers)?<\/li>\n<li>In which systems is identity data stored?<\/li>\n<li>How are authorizations currently managed?<\/li>\n<li>What specific challenges and compliance guidelines exist?<\/li>\n<\/ul>\n<p>This information forms the basis for optimally adapting an IAM system to the needs of the company.<\/p>\n<\/li>\n<li>\n<h3 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Definition-of-requirements\"><\/span>Definition of requirements<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>On the basis of the analysis, the requirements for the future IAM system are defined. Here, all relevant identities and user groups must be taken into account. A good role concept helps to assign responsibilities and to grant authorizations automatically.<\/p>\n<\/li>\n<li>\n<h3 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Planning\"><\/span>Planning<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A clear resource and time plan is crucial for a successful implementation. Companies should ask themselves:<\/p>\n<ul>\n<li>By when should the IAM system be implemented?<\/li>\n<li>How much is available in the project budget?<\/li>\n<li>What internal and external resources are needed?<\/li>\n<\/ul>\n<\/li>\n<li>\n<h3 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Proof-of-concept-PoC\"><\/span>Proof of concept (PoC)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A PoC is an excellent way to test the planned solution in advance. This way, the prospective customer can ensure that the system meets the specific requirements of the company.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion-The-right-partner-makes-all-the-difference\"><\/span>Conclusion: The right partner makes all the difference<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The introduction of an IAM system requires a systematic approach to minimize risks and ensure long-term success. Protecting sensitive data is essential. Companies should ensure that their IAM solution meets the highest data protection standards and is stored in certified data centers. For German companies in particular, it makes sense to opt for solutions \u201cMade in Germany\u201d that meet the strict data protection requirements.<\/p>\n<p>Whether you have clear goals or are still unsure about your initial situation \u2013 FirstAttribute AG has been helping companies to manage identities securely, efficiently and in a system-connecting way since its foundation.<\/p>\n<p>Contact us to start your status quo analysis and lay the foundation for a successful IAM implementation.<\/p>\n<p><a href=\"https:\/\/firstware.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener\"><button class=\"ButtonBeratung2 aligncenter\">Contact us today<\/button><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"More-about-FirstWare-IDM-Portal\"><\/span>More about FirstWare IDM-Portal<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img decoding=\"async\" class=\"alignleft wp-image-36704\" title=\"IDM-Portal hybrid IAM solution\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2021\/08\/IDM-Portal-Hybrid-IAM-Loesung-1.png\" alt=\"IDM-Portal hybrid IAM solution\" width=\"238\" height=\"199\" srcset=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/IDM-Portal-Hybrid-IAM-Loesung-1.png 453w, https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/IDM-Portal-Hybrid-IAM-Loesung-1-300x250.png 300w\" sizes=\"(max-width: 238px) 100vw, 238px\" \/>Das<a href=\"https:\/\/firstware.com\/en\/\"> FirstWare IDM-Portal<\/a> of FirstAttribute is an integrated solution for identity and access management (IAM) that enables the automated administration of users and their permissions, whether on-premises or in the cloud.<\/p>\n<p>This portal integrates all facets of identity and access management and enables centralized access to identity and directory services.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The introduction of an Identity &amp; Access Management (IAM) system is indispensable for companies that want to meet the challenges [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1839],"tags":[1994],"class_list":["post-47081","post","type-post","status-publish","format-standard","hentry","category-identity-management-en","tag-iam-guide"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IAM guide \u2013 Important first steps for a successful IAM project<\/title>\n<meta name=\"description\" content=\"IAM systems are the key to digitalization. Start with our IAM guide and a clear analysis of the current situation. Find out more now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IAM guide \u2013 Important first steps for a successful IAM project\" \/>\n<meta property=\"og:description\" content=\"IAM systems are the key to digitalization. Start with our IAM guide and a clear analysis of the current situation. Find out more now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"FirstWare IDM-Portal\" \/>\n<meta property=\"og:image\" content=\"https:\/\/firstware.com\/wp-content\/uploads\/2025\/01\/IAM-guide-FirstAttribute-207x300.jpg\" \/>\n<meta name=\"author\" content=\"Sophia Tunui\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sophia Tunui\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/\"},\"author\":{\"name\":\"Sophia Tunui\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/person\\\/e7504910be78b9b066298168ab6e839e\"},\"headline\":\"Our IAM guide to preparing for an identity and access management project\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/\"},\"wordCount\":750,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/IAM-guide-FirstAttribute-207x300.jpg\",\"keywords\":[\"IAM guide\"],\"articleSection\":[\"Identity Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/\",\"name\":\"IAM guide \u2013 Important first steps for a successful IAM project\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/IAM-guide-FirstAttribute-207x300.jpg\",\"description\":\"IAM systems are the key to digitalization. Start with our IAM guide and a clear analysis of the current situation. Find out more now!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/IAM-guide-FirstAttribute-207x300.jpg\",\"contentUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/IAM-guide-FirstAttribute-207x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/iam-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our IAM guide to preparing for an identity and access management project\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"name\":\"FirstWare IDM-Portal\",\"description\":\"Identity and Autorization Management in M365 and Active Directory\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\",\"name\":\"FirstWare IDM-Portal\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"contentUrl\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"width\":1,\"height\":1,\"caption\":\"FirstWare IDM-Portal\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/person\\\/e7504910be78b9b066298168ab6e839e\",\"name\":\"Sophia Tunui\",\"sameAs\":[\"http:\\\/\\\/firstattribute.com\"],\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/author\\\/sophia-tunui\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IAM guide \u2013 Important first steps for a successful IAM project","description":"IAM systems are the key to digitalization. Start with our IAM guide and a clear analysis of the current situation. Find out more now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/","og_locale":"en_US","og_type":"article","og_title":"IAM guide \u2013 Important first steps for a successful IAM project","og_description":"IAM systems are the key to digitalization. Start with our IAM guide and a clear analysis of the current situation. Find out more now!","og_url":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/","og_site_name":"FirstWare IDM-Portal","og_image":[{"url":"https:\/\/firstware.com\/wp-content\/uploads\/2025\/01\/IAM-guide-FirstAttribute-207x300.jpg","type":"","width":"","height":""}],"author":"Sophia Tunui","twitter_misc":{"Written by":"Sophia Tunui","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#article","isPartOf":{"@id":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/"},"author":{"name":"Sophia Tunui","@id":"https:\/\/www.firstware.com\/en\/#\/schema\/person\/e7504910be78b9b066298168ab6e839e"},"headline":"Our IAM guide to preparing for an identity and access management project","mainEntityOfPage":{"@id":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/"},"wordCount":750,"publisher":{"@id":"https:\/\/www.firstware.com\/en\/#organization"},"image":{"@id":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2025\/01\/IAM-guide-FirstAttribute-207x300.jpg","keywords":["IAM guide"],"articleSection":["Identity Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/","url":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/","name":"IAM guide \u2013 Important first steps for a successful IAM project","isPartOf":{"@id":"https:\/\/www.firstware.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#primaryimage"},"image":{"@id":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2025\/01\/IAM-guide-FirstAttribute-207x300.jpg","description":"IAM systems are the key to digitalization. Start with our IAM guide and a clear analysis of the current situation. Find out more now!","breadcrumb":{"@id":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstware.com\/en\/blog\/iam-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#primaryimage","url":"https:\/\/firstware.com\/wp-content\/uploads\/2025\/01\/IAM-guide-FirstAttribute-207x300.jpg","contentUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2025\/01\/IAM-guide-FirstAttribute-207x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstware.com\/en\/blog\/iam-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.firstware.com\/en\/"},{"@type":"ListItem","position":2,"name":"Our IAM guide to preparing for an identity and access management project"}]},{"@type":"WebSite","@id":"https:\/\/www.firstware.com\/en\/#website","url":"https:\/\/www.firstware.com\/en\/","name":"FirstWare IDM-Portal","description":"Identity and Autorization Management in M365 and Active Directory","publisher":{"@id":"https:\/\/www.firstware.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstware.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firstware.com\/en\/#organization","name":"FirstWare IDM-Portal","url":"https:\/\/www.firstware.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","contentUrl":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","width":1,"height":1,"caption":"FirstWare IDM-Portal"},"image":{"@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.firstware.com\/en\/#\/schema\/person\/e7504910be78b9b066298168ab6e839e","name":"Sophia Tunui","sameAs":["http:\/\/firstattribute.com"],"url":"https:\/\/www.firstware.com\/en\/blog\/author\/sophia-tunui\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/posts\/47081","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/comments?post=47081"}],"version-history":[{"count":0,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/posts\/47081\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/media?parent=47081"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/categories?post=47081"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/tags?post=47081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}