An image of so-called “integrated identity information” is constructed in the service. In short, it can work with one or more data sources in order to compile a configurable image of what an object (user, units, groups, roles, etc) looks like. This image of the object can then be treated in different steps. It can be distributed and stored in various data sources. Because AAM ships with a large number of actions to process and handle information, no developer has to be involved in the implementation.
By exploiting features of AAM, companies and organizations can secure good quality of data between systems and processes. This is important, especially when migrating extensive amounts of information between systems, something that often follows a strictly defined workflow.
The powerful reporting features that are included in the AAM will create increased visibility of the assets that exist within an organization. It can include everything from licensing to system access for employees. AAM can also provide an overview of how information from different sources is consistent. AAM is a powerful solution that uses existing infrastructures and resources so there are no hidden costs or expensive investments.