Jackson Shaw Quest Software , Inc . Unified and Intelligent Identity and Access Management

نویسنده

  • Jackson Shaw
چکیده

........................................................................................................................................................ 3 Introduction.................................................................................................................................................... 4 The Solution: Identity Intelligence ................................................................................................................. 6 What is Identity Intelligence? ..................................................................................................................... 6 Traditional Strategies for IAM .................................................................................................................... 6 Using Point Solutions .............................................................................................................................................. 6 Using an IAM Framework........................................................................................................................................ 7 A Unified and Intelligent Approach to IAM ................................................................................................. 7 Key Features of a Unified and Intelligent Approach to IAM ..................................................................................... 7 An Illustration .......................................................................................................................................................... 8 Using a Unified and Intelligent Approach to IAM ..................................................................................................... 8 Provisioning ................................................................................................................................................. 10 Challenges of Traditional Provisioning .................................................................................................... 10 A Unified and Intelligent Approach to Provisioning .................................................................................. 11 Single Sign-on ............................................................................................................................................. 13 Types of SSO Solutions ........................................................................................................................... 13 Comparing the SSO Approaches .......................................................................................................................... 14 True SSO .............................................................................................................................................................. 15 The Best Option: a Blended Approach .................................................................................................... 15 Role Management ....................................................................................................................................... 17 Using Custom Business Logic as a Workaround .................................................................................... 18 A Unified and Intelligent Approach to Role Management ........................................................................ 18 Multifactor Authentication ............................................................................................................................ 20 A Unified and Intelligent Approach to Multifactor Authentication ............................................................. 20 Password Management .............................................................................................................................. 22 One Option: Self-Service Password Management .................................................................................. 22 A Unified and Intelligent Approach to Password Management ............................................................... 22 Privileged Account Management ................................................................................................................ 24 A Unified and Intelligent Approach to Privileged Account Management ................................................. 24 What if I Already Have an IAM Framework? ............................................................................................... 26 Conclusion................................................................................................................................................... 28

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design, Implementation and Evaluation of Software to Increase Users’ Awareness and Facilitate the Identification of the Most Appropriate Centers Providing Laboratory Services in Tehran Province

Background and Aim: Medical diagnostic laboratories are among the most important centers in the treatment cycle of patients. Today, the conscious choice of such laboratories is one of the challenges that patients face in the treatment process. This study was conducted with the aim of improving the knowledge of software users in the field of laboratory sciences and also facilitating the consciou...

متن کامل

Formalizing UML Class Diagrams

Graphical notations have demonstrated usefulness when interacting with end users, making system validation easier. However, while they can be easily communicated, they lack precision, which consequently can be ambiguous and lead to misunderstanding. It is here where formal specifications can play an important role in overcoming this drawback. In this chapter, we use the RAISE Specification Lang...

متن کامل

Evaluation of Unified Security, Trust and Privacy Framework (UnifiedSTPF) for Federated Identity and Access Management (FIAM) Mode

Federated identity and access management systems such as Shibboleth may symbolize a boost: (i) to bring the efficiency and effectiveness in collaboration for governments, enterprises and academia, and (iii) conserve the home domain user's identity privacy in a privacy-enhanced fashion. However, the consternation is about the absence of a trusted computing based mutual trust and security es...

متن کامل

Intelligent Vehicle Highway Systems (Ivhs) Issues and Recommendations

Intelligent Vehicle Highway Systems (IVHS) is the integration of various pieces of information and computer technologies to the transportation elements in order to obtain a more productive transportation system. The five major components of IVHS are the Advanced Traffic Management Systems (ATMS), Advanced Vehicle Control Systems (AVCS), and Advanced Public Transportation systems (APTS). This pa...

متن کامل

Designing and Dismounting an Intelligent System of Irrigation Management for Greenhouse based on Delphi Software

The drought continuity and also restricting watery sources caused agriculture section forgetold flooding methods for optimum water exploitation and proceeding new irrigation systems.New generation of irrigation systems called intelligent systems is a new solution leading toexploiting water increase to higher than 80%. In order to measure sensors and to controlprocessors in designing and dismoun...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011