Section 6.1, Planning an Identity Project
Section 6.2, Using Designer In Your Planning Process
Section 6.3, Security Best Practices