Identity and Access Management Selection Framework (IAM Adventist)
Adventist Church Worldwide
Collect the IAM requirements and end objectives that should guide platform selection across the global church.
This web application gathers technical and strategic input from each participant, applies weighted scoring, and produces a structured requirements profile, end-objective summary, and vendor-selection emphasis model for IAM platform evaluation.
Framework stance
Open standards, hybrid fit, portable identity
Governance model
Shared trust with delegated administration
Identity scope
Workers, members, and public-facing constituencies
Immediate selection signals
0%
Questionnaire completion
28
Weighted requirement prompts
9
Vendor evaluation dimensions
6
End-state objective lenses
Step 1 · Participant capture
Chapter 01
Strategic Mission and End Objectives
These questions determine the business outcomes and missional objectives the platform must support beyond pure technical compliance.
M01Weight 5 / 5
Single institutional identity priority
How important is a single portable identity for employees, credentialed workers, members, and other authorized participants across church-operated systems?
Use this question to indicate how strongly the future platform must unify identity experience across organizational levels.
M02Weight 4 / 5
Cross-organization collaboration outcome
How strongly should the platform reduce barriers to secure collaboration across General Conference, divisions, unions, conferences, missions, and institutions?
This captures the value of interoperability across the global church structure.
M03Weight 4 / 5
Key IAM requirements
Describe the core IAM requirements the selected platform must satisfy for this organization, institution, or platform context.
Capture the most important functional, governance, security, integration, lifecycle, or operational requirements that should influence vendor selection.
M04Weight 3 / 5
Desired end-state objectives
Describe the top end-state objectives this IAM platform must enable over the next three to five years.
Examples may include unified access, improved trust, stronger controls, lower admin burden, or improved member digital services.
Chapter 02
Identity Populations and Lifecycle Scope
These questions clarify who must be represented, how those identities change over time, and how broad the platform footprint must be.
P01Weight 5 / 5
Priority identity populations
Which identity populations must be directly supported by the selected platform?
Select every population that the future platform must manage or federate.
P03Weight 5 / 5
Authoritative identity source model
Does the target platform need to accommodate multiple authoritative identity sources owned by different organizational levels or institutions?
This is critical for federated authority and directory coexistence.
Chapter 03
Federated Governance and Delegated Administration
These questions define how authority should be distributed while preserving shared controls, trust, and auditability.
G01Weight 5 / 5
Delegated administration requirement
How important is delegated administration that mirrors the church structure while preserving policy guardrails and separation of duties?
This is central to the federated governance model you described.
G03Weight 4 / 5
Shared policy enforcement
Does the future platform need central policy templates with localized administration and exceptions handling?
This identifies whether shared trust must coexist with regional or institutional autonomy.
G04Weight 3 / 5
Governance concerns to resolve
What governance or decision-right concerns must be addressed before a global shared IAM framework can succeed?
Capture issues such as ownership, trust, autonomy, funding, or accountability.
Chapter 04
Current Landscape, Integration, and Portability
These questions translate your current technical environment into evaluation criteria for interoperability and migration.
A01Weight 5 / 5
Hybrid and sovereign deployment fit
How important is support for hybrid deployment, sovereign hosting patterns, and regional data residency constraints such as EU handling?
This determines how strict the platform’s deployment and hosting model must be.
A02Weight 5 / 5
Open standards requirement
How important is native support for open standards and protocols to avoid long-term dependence on a single vendor approach?
Consider federation, provisioning, directory sync, and application integration standards.
A03Weight 4 / 5
Integration depth target
Which integration pattern best describes your target expectation for legacy, on-premises, SaaS, VPN, and cloud platforms?
Choose the option that best reflects expected breadth and difficulty of integration work.
A04Weight 3 / 5
Existing identity systems that must coexist or migrate
Document the existing identity sources, directories, or platforms that the new solution must integrate with, coexist with, or replace.
Examples include Active Directory, Entra ID, Google Workspace, Okta, LDAP directories, HR sources, and application-owned stores.
Chapter 05
Access, Authentication, and Privileged Control
These questions identify the strength of control and the user experience the selected IAM platform must deliver.
X01Weight 5 / 5
SSO and federation requirement
How important is broad single sign-on and federation support across workforce, member, and partner-facing systems?
This is a core discriminator for the future platform.
X02Weight 5 / 5
MFA and passwordless requirement
How important is support for strong MFA, adaptive authentication, and passwordless patterns for relevant populations?
Consider usability as well as control strength.
X03Weight 4 / 5
Privileged access control
How important is privileged access management, elevation control, or high-risk administrative session governance?
This helps determine whether PAM should be first-class in the platform strategy.
X04Weight 3 / 5
API and machine identity security
How important is securing APIs, service accounts, and non-human identities as part of the broader IAM evaluation?
This identifies whether the scope extends beyond interactive users.
Chapter 06
Privacy, Stewardship, and Compliance
These questions ensure the selected platform respects church stewardship principles and external obligations.
R02Weight 5 / 5
Regulatory and control alignment
How important is demonstrable support for GDPR-aligned privacy handling, ISO 27001 control alignment, SOC 2 evidence expectations, and NIST-informed security practices?
This assesses the strength of reporting, policy, and control support required from the product.
R03Weight 4 / 5
Regional data residency enforcement
Does the platform need enforceable regional boundaries, selective data placement, or residency-aware administrative controls?
Use this question to express hard regional handling requirements.
R04Weight 3 / 5
Sensitive privacy concerns
Describe any privacy, consent, jurisdictional, or stewardship concerns that should strongly influence vendor selection.
Capture any concerns that are non-negotiable or politically sensitive.
Chapter 07
Operations, Reporting, and Service Sustainability
These questions capture how the platform must operate day to day and how success should be monitored.
O01Weight 4 / 5
Reporting and audit evidence need
How important are operational dashboards, audit exports, access analytics, and board-ready or audit-ready reporting?
This differentiates products with strong operational observability from products that only handle sign-in.
O02Weight 4 / 5
Resilience and supportability
How important are resilience, high availability, disaster recovery, regional continuity, and strong vendor support maturity?
This indicates whether operational robustness is a major selection factor.
O03Weight 3 / 5
Administrative usability
How important is an administrative experience that regional and institutional teams can operate effectively without excessive specialist dependence?
This is especially relevant in a federated church support model.
O04Weight 3 / 5
Success measures
What measurable indicators would tell you the new IAM platform is succeeding after implementation?
Examples may include provisioning speed, audit readiness, user adoption, fewer access incidents, or better regional coordination.
Chapter 08
Phasing, Prioritization, and Vendor Selection
These questions convert vision into implementation priorities and vendor evaluation criteria.
V01Weight 4 / 5
Phase timing for core capabilities
When should the following capabilities be available in your target roadmap: SSO, MFA, lifecycle management, provisioning, federation, access reviews, PAM, API security, CIAM, passwordless, delegated administration?
Use the notes field after submission to explain any phase-specific nuance or dependencies.
V02Weight 5 / 5
Tolerance for vendor lock-in
How low is your tolerance for proprietary dependence that would make future migration, coexistence, or standards-based interoperability difficult?
Use a high rating if platform portability is a critical board-level or strategy-level requirement.
V03Weight 4 / 5
Non-negotiable vendor selection criteria
What selection criteria would immediately disqualify a vendor or materially reduce confidence in the platform?
Capture red lines such as residency limitations, weak federation, poor delegated administration, or inadequate privacy controls.
V04Weight 3 / 5
Organizational readiness for phased delivery
How ready is your organization or team to participate in a phased IAM rollout with shared governance, policy alignment, and migration activity?
This helps interpret ambition against implementation readiness.