Friday, November 23, 2012

Basic telco identity model

Screen_shot_2012-11-23_at_12

Users with identities (telco issued or not) use devices (telco bound or not) on networks (telco owned or not) to access applications (telco hosted or not).

Posted via email from Pre(posterous)

1 comment:

André Koot said...

Nice architecture :)
You also need to take into account that there are different processes that are all connected to a customer: CRM, Provisioning (not user provisioning, but providing hardware, sims and phone numbers) and billing. In many cases these are silos. And then mobile can also be post-paid (subscription based) and pre-paid, both with complete different billing models.

I used this model to analyse user management at a telco: http://id-use.blogspot.nl/2012/09/identity-management-and-crm.html
This is not usable like your model, because it doesn't show the identity flow like your model.