The process of managing employee identity, or ensuring that IT resources can only be accessed by the right users, has been evolving since the very first terminal-based login. From desktop-based ...