This guide contains information about security best practices you might want to implement in your Identity Manager environment. The guide is organized as follows:
This guide is intended for administrators, consultants, and network engineers who require a high-level introduction to Identity Manager business solutions, technologies, and tools.
For the most recent version of this document, see the Identity Manager Documentation Web site.
For documentation on other Identity Manager drivers, see the Identity Manager Drivers Web site .