The average user in a medium to large enterprise has 16 applications that they need to access to do their job. This means 16 username / password combinations. Doing the math, this translates to a metric boatload of help desk calls to support this many passwords.
There are three things you can do about this:
- Provide single sign on (SSO)
- Provide self service password reset
- Synchronize passwords between the applications
There are advantages and limitations to each option. Single sign on is probably the best solution, having your users log in once and then be authenticated into each application. However, if the application doesn't support federation, you will need to do password vaulting and you still have the problem of a lot of passwords. Many legacy systems will have this limitation.
Providing self service password reset is also a great option. It allows you to delegate changing passwords once forgotten and can have built in security like two factor authentication or forced enrollment. But, you're supporting 16 applications and you might as well fix the problem before the horse leaves the barn.
That brings us to password synchronization. You will give your user a single password that is the same for each application. When they change it in one place (for example, Active Directory), it will be synchronized to each application. Users will still need to enter a password each time, but they only have to remember 1 not 16.
Before I go any further, the same EmpowerID module for password synchronization also provides self service password reset, giving you option 2 & 3 in one fell swoop. Since EmpowerID is a single code-base platform, EmpowerID SSO Manager also can work in conjunction with Password Manager to provide all three options to work together.
EmpowerID is a hub and spoke model, with a metadirectory sitting squarely in the middle keeping identity data and passwords synchronized. You will most likely have a source of truth for the password, whether it be the EmpowerID directory or Active Directory. Once this password is changed, EmpowerID will write out that password to all affected applications using stored procedures or APIs.
If there are different password complexity requirements, EmpowerID can enforce the most restrictive and ensure that the user has a single password for all applications. If there are mutually exclusive password policies (no special characters in one but special characters required in another, we should explore single sign on).
The first question is usually, what starts this process? How can you synchronize a password if it is encrypted in the source of truth directory? We can't, nobody can. We need to force the synchronization process to start by changing the password initially. Once EmpowerID has the password, we can follow the security guidelines of each application to synchronize the new password to these 16 applications.
The simplest way to do this is to force the user to change their password on the next login, whether it is to EmpowerID or to Active Directory. This setting is easy to turn on and gives the user an easy way to create the new synchronized password. We can also build the password change action into any authentication workflow or give them the requirement to change the password x days before expiration.
But we haven't really saved IT a lot of time yet unless it's easy to implement and configure. That's where EmpowerID's visual workflow comes in. Every identity action your users take goes through a workflow which can be customized and personalized. For our password example, this means that for users with more highly privileged access can be forced to change passwords more often or to also need two factor authentication with OATH tokens.
This workflow maps to your business process and gives you flexibility in how you manage your passwords and users, giving different policies for different roles or applications. In short, it makes password management flexible.
But once the users have a single password, the metric boatload of time saved by IT can go towards the single sign on (SSO) project you've been looking at.

Prior to The Dot Net Factory, I spent over six years helping healthcare organizations implement software solutions. During that time I helped doctors, frontline care workers, financial staff, even maintence staff to replace paper documentation systems with electronic documentation solutions. Now my time in Identity & Access Management (IAM) has helped me to bridge the gap between healthcare and IAM. Here is a list of common complaints that I heard in the healthcare world:
EmpowerID makes role based SharePoint permissions possible by being a 
Authentication is a key point on this security balance beam. Password complexity, multi factor authentication, adaptive authentication, 
Identity and access management (IAM) is a big concept. Google analytics tells me that there are 18,100 searches for this term each and every month. Gartner's definition is that "IAM ensures the right people have the right access to the right resources at the right time, enabling the right business outcomes." That is a big concept.
In the real world, the best example is your driver's license. When you present your driver's license to the bank to prove that you are you, the bank (service provider) is trusting that the DMV (identity provider) has properly vetted you with birth certificates, social security cards, or other identity information. Because of this trust, or federation, you don't have to carry all of these documents with you everywhere and prove to every single person that you are you. They trust the DMV (or whatever institution in your country provides driver's licenses) to have taken the appropriate steps to prove your identity.
To paraphrase Gartner, Identity and Access Management is the act of getting the right people the right access to the right resources at the right time. Central to that concept is the right people.
Even these steps aren't as secure as they could be. Self service password reset rides that delicate balance between productivity and security. Users will forget passwords and get locked out, to minimize the disruption to their work day, you need to offer self service with as few roadblocks as possible. However, the bad guys can take advantage of this lack of roadblocks and reset passwords. 

You don't do it with cloud vendors or traditional IAM solutions. EmpowerID's tagline is a "New breed of Identity Management" and this is why. The platform was built from the ground up without the burdens of acquisitions or partnerships to create the full suite. So, the whole product line shares the same RBAC model, the same API layer, the same metadirectory, the same visual workflow designer. It is a true platform.
