Jackson Shaw Quest Software , Inc . Unified and Intelligent Identity and Access Management
نویسنده
چکیده
........................................................................................................................................................ 3 Introduction.................................................................................................................................................... 4 The Solution: Identity Intelligence ................................................................................................................. 6 What is Identity Intelligence? ..................................................................................................................... 6 Traditional Strategies for IAM .................................................................................................................... 6 Using Point Solutions .............................................................................................................................................. 6 Using an IAM Framework........................................................................................................................................ 7 A Unified and Intelligent Approach to IAM ................................................................................................. 7 Key Features of a Unified and Intelligent Approach to IAM ..................................................................................... 7 An Illustration .......................................................................................................................................................... 8 Using a Unified and Intelligent Approach to IAM ..................................................................................................... 8 Provisioning ................................................................................................................................................. 10 Challenges of Traditional Provisioning .................................................................................................... 10 A Unified and Intelligent Approach to Provisioning .................................................................................. 11 Single Sign-on ............................................................................................................................................. 13 Types of SSO Solutions ........................................................................................................................... 13 Comparing the SSO Approaches .......................................................................................................................... 14 True SSO .............................................................................................................................................................. 15 The Best Option: a Blended Approach .................................................................................................... 15 Role Management ....................................................................................................................................... 17 Using Custom Business Logic as a Workaround .................................................................................... 18 A Unified and Intelligent Approach to Role Management ........................................................................ 18 Multifactor Authentication ............................................................................................................................ 20 A Unified and Intelligent Approach to Multifactor Authentication ............................................................. 20 Password Management .............................................................................................................................. 22 One Option: Self-Service Password Management .................................................................................. 22 A Unified and Intelligent Approach to Password Management ............................................................... 22 Privileged Account Management ................................................................................................................ 24 A Unified and Intelligent Approach to Privileged Account Management ................................................. 24 What if I Already Have an IAM Framework? ............................................................................................... 26 Conclusion................................................................................................................................................... 28
منابع مشابه
Design, Implementation and Evaluation of Software to Increase Users’ Awareness and Facilitate the Identification of the Most Appropriate Centers Providing Laboratory Services in Tehran Province
Background and Aim: Medical diagnostic laboratories are among the most important centers in the treatment cycle of patients. Today, the conscious choice of such laboratories is one of the challenges that patients face in the treatment process. This study was conducted with the aim of improving the knowledge of software users in the field of laboratory sciences and also facilitating the consciou...
متن کاملFormalizing UML Class Diagrams
Graphical notations have demonstrated usefulness when interacting with end users, making system validation easier. However, while they can be easily communicated, they lack precision, which consequently can be ambiguous and lead to misunderstanding. It is here where formal specifications can play an important role in overcoming this drawback. In this chapter, we use the RAISE Specification Lang...
متن کاملEvaluation of Unified Security, Trust and Privacy Framework (UnifiedSTPF) for Federated Identity and Access Management (FIAM) Mode
Federated identity and access management systems such as Shibboleth may symbolize a boost: (i) to bring the efficiency and effectiveness in collaboration for governments, enterprises and academia, and (iii) conserve the home domain user's identity privacy in a privacy-enhanced fashion. However, the consternation is about the absence of a trusted computing based mutual trust and security es...
متن کاملIntelligent Vehicle Highway Systems (Ivhs) Issues and Recommendations
Intelligent Vehicle Highway Systems (IVHS) is the integration of various pieces of information and computer technologies to the transportation elements in order to obtain a more productive transportation system. The five major components of IVHS are the Advanced Traffic Management Systems (ATMS), Advanced Vehicle Control Systems (AVCS), and Advanced Public Transportation systems (APTS). This pa...
متن کاملDesigning and Dismounting an Intelligent System of Irrigation Management for Greenhouse based on Delphi Software
The drought continuity and also restricting watery sources caused agriculture section forgetold flooding methods for optimum water exploitation and proceeding new irrigation systems.New generation of irrigation systems called intelligent systems is a new solution leading toexploiting water increase to higher than 80%. In order to measure sensors and to controlprocessors in designing and dismoun...
متن کامل