![Understanding the Identity Governance Components - Identity Governance 3.6 Installation and Configuration Guide Understanding the Identity Governance Components - Identity Governance 3.6 Installation and Configuration Guide](https://www.netiq.com/documentation/identity-governance-36/install-guide/graphics/components_identity_governance_high_level_a.png)
Understanding the Identity Governance Components - Identity Governance 3.6 Installation and Configuration Guide
![NetIQ Identity Manager Identity Management Technology Lightweight Directory Access Protocol, PNG, 661x501px, Netiq, Access Control, Brand, NetIQ Identity Manager Identity Management Technology Lightweight Directory Access Protocol, PNG, 661x501px, Netiq, Access Control, Brand,](https://img.favpng.com/5/5/22/netiq-identity-manager-identity-management-technology-lightweight-directory-access-protocol-png-favpng-6V2LxdfMtJawvZCFN0buf22e3.jpg)
NetIQ Identity Manager Identity Management Technology Lightweight Directory Access Protocol, PNG, 661x501px, Netiq, Access Control, Brand,
![Forefront Identity Management – Certificate Management (FIM CM 2010) – Part 2 | Ammar Hasayen - Blog Forefront Identity Management – Certificate Management (FIM CM 2010) – Part 2 | Ammar Hasayen - Blog](https://ammarhasayen.files.wordpress.com/2013/09/fim_cim_324553343.png)
Forefront Identity Management – Certificate Management (FIM CM 2010) – Part 2 | Ammar Hasayen - Blog
![Identity and Access Management by Wentz Wu, CISSP/ISSMP/ISSAP/ISSEP,CCSP,CSSLP,CISM,PMP,CBAPWentz Wu Identity and Access Management by Wentz Wu, CISSP/ISSMP/ISSAP/ISSEP,CCSP,CSSLP,CISM,PMP,CBAPWentz Wu](https://wentzwu.com/wp-content/uploads/2019/06/identityandaccessmanagement.jpg)