Streamline Identity Management Playbook

Edit this page

Step 9 - Integrate Your AAES With Your IT infrastructure


Designing an AAES solution architecture requires agencies to consider the capabilities presented in the FICAM Architecture, existing ICAM investments (e.g., logical access solutions), and your agency’s overall IT infrastructure. The goal of this step is to find how an AAES capability will integrate with your agency’s IT infrastructure and provide digital identity attribute sharing services.

An AAES provides a consolidated system for securely and electronically exchanging digital identity attributes between authoritative data sources and your agency applications that consume those attributes. In many cases, this data is spread across multiple authoritative sources within your agency, which complicates the challenge of exchanging attributes between sources and consumers. The AAES should be primarily comprised of two specific solution components:

  • Authoritative Attribute Manager. Provides the capability to present a single, authoritative view of that data by reconciling and aggregating attributes from the various sources.
  • Authoritative Distributor. The component that integrates with attribute consumers and conducts the data exchange.

The FICAM Architecture Applications View provides a view of general enterprise ICAM applications and systems. It represents multiple solutions that your agency may choose to use. The solution components are represented generically and could be implemented using a variety of Commercial Off-The-Shelf (COTS) or purpose-built products. Your agency should evaluate its existing ICAM and infrastructure investments and select the approach that best meets their needs.


AAES Characteristic ID
AAES Solution Characteristics
AAES 1 Provides aggregation of identity attributes
AAES 2 Supports deployment of connectors and service interfaces to retrieve identity attributes for distributed sources
AAES 3 Uses a unique person identifier to distinguish between identities
AAES 4 Provides transformation of identity attributes from authoritative source data storage format to a standardized format to present data externally
AAES 5 Provides correlation of identity attributes from distributed sources of identity information
AAES 6 Provides the capabiltiy to reconcile differences between different sources of identity attributes
AAES 7 Provides an interface to request identity attributes over common protocols, such as LDAP/s, DSML, SAML, and SPML
AAES 8 Provides security to protect data against unauthorized access and logging to facilitate audits
AAES 9 Provides various views of identity attributes and display them only to users or systems that are authorized to view those attributes
AAES 10 Provides the ability to request identity data based on a variety of methods (name, globally unique identifier, email, DOB)
AAES 11 Provides reports of identity attributes
AAES 12 Provides the capability to push or pull identity attributes, including the ability to distribute new identities and updates to existing identity attributes
AAES 13 Provides the capability to protect data at rest
AAES 14 Provides the capability to sign attribute assertions