Understanding and structuring identity management in the enterprise: IAM principles, access governance, user repository, and best practices for regaining control in the long term.