Key Selection Criteria for Identity Management Software