Intelligence Driven Identity and Access Management

ثبت نشده
چکیده

The way organizations manage access to their critical applications and data is quickly becoming unwieldy and overly complicated. That’s because traditional identity and access management (IAM) solutions, which were supposed to help organizations guard their IT systems and networks against unsafe access, were built on outdated assumptions to meet outdated requirements. First, the user population is no longer just made up of on-premises employees, but also includes partners, vendors, customers, and clients – all of whom require access to corporate applications. Next, devices are no longer just corporate desktops, but also include corporate and personal laptops, tablets, and mobile phones. Finally, this increase in the number and types of users and access methods has created an “identity crisis” at many organizations – where their systems are unable to manage and unify this disparate information, resulting in fragmented user profiles and multiple digital identities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity Management in Business Process Modelling: A Model-driven Approach

The modelling of business processes is widely used in enterprises. Though this is very common, requirements for identity management and access control are often collected separately in documents or requirement tools. Due to the business-driven background of access control, this kind of requirement should be collected at the business site's business process model. This work introduces a meta-mod...

متن کامل

Jackson Shaw Quest Software , Inc . Unified and Intelligent Identity and Access Management

........................................................................................................................................................ 3 Introduction.................................................................................................................................................... 4 The Solution: Identity Intelligence ..............................................

متن کامل

Towards a Model-driven Approach to Control Identity Management Systems

Identity management systems require consolidating the diversity of many user repositories, the creation of roles and their assignment to the identity management software. To decrease administration costs we propose linking the identity management system to business process models which contain the organizational responsibilities. Therefore, we introduce a modeling grammar to model web-services ...

متن کامل

An MDA-Based Environment for Generating Access Control Policies

Identity management and access control are essential in the enterprise IT landscape in order to control access to applications and to fulfil laws or regulations. The global competition of enterprises leads to short development cycles and fast changes of IT applications, which requires also an error-free and quick adaption of its security. The modeldriven development of access control policies p...

متن کامل

Application Access Control using Enterprise Models

In this paper a framework for a model-driven control of identity management systems is presented. An important issue in today’s information systems security discussion addresses the effective authorisation of users. With established conceptual modelling languages the assignment of roles to the identity management software is an enormous organisational effort. To decrease administration costs we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015