Design a justifiable plan to create secure solution that identifies, authorizes, and provides access to users throughout the organization. Access requirements include general users plus different solutions suitable for five other areas: researchers, HR, IT (including contractors), Finance, and customers. Paying particular attention to providing practical solutions for users, including training and Single Sign On (SSO).