Fritsch, LotharRoßnagel, HeikoSchunck, Christian H.Mödersheim, SebastianHühnlein, Detlef2020-05-272020-05-272020978-3-88579-699-2https://dl.gi.de/handle/20.500.12116/33168Identity management (IdM) facilitates identification, authentication and authorization in most digital processes that involve humans. Digital services as well as work processes, customer relationship management, telecommunications and payment systems rely on forms of IdM. IdM is a business-critical infrastructure. Organizations rely on one specific IdM technology chosen to fit a certain context. Registration, credential issuance and deployment of digital identities are then bound to the chosen technology. What happens if that technology is disrupted? This article discusses consequences and mitigation strategies for identification collapse based on case studies and literature search. The result is a surprising shortage of available documented mitigation and recovery strategies for identification collapse.enidentity managementbusiness continuitycybersecuritycontingency managementIdentification collapse - contingency in Identity ManagementText/Conference Paper10.18420/ois2020_011617-5468