Everyone wants to integrate their access request processes into ITSM, but what is the reality behind this?
What kind of integrations are required, what are the pros and cons of requesting access through the ITSM solution instead of the IAM solution.
This talk is based on several (long) discussions with several clients