collect the videos you love
collect | share | explore
Tag results for authentication
sort by: relevance | recent
Results from all user's collections (66 out of ~66)
The results from your search appear low, try our web search for better results.
users and accounts

hitachi-idcomusers and accountscontent: list of users with and without identity attributes list of accounts on a given systemkey concepts: the simplest reports in any iam system are lists of users and accounts built-in hitachi id identity manager reports can enumerate users attributes accounts group memberships roles and moresee more at: http:hitachi-idcomidentity-manageroverviewreportshtml
report 2 pdr

hitachi-idcomreport 2 pdrcontent: schedule a report to periodically scan for dormant accounts and automatically disable themkey concepts: report output can be fed back into the request system for actionable analytics columns in each row are mapped to input fields on the selected request form rows already processed in previous report runs are omitted to avoid requesting the same remediation repeatedly the process can be run once interactively or scheduled to repeat periodicallysee more at: http:hitachi-idcomidentity-manageroverviewreportshtml
infineons optiga trust x device security solution

http:wwwfutureelectronicscomentechnologiesproductaspxproductid=optigatrustxevalkitobotinfineon3092447ampim=0 ill be discussing the features and benefits of infineons optiga trust x device security solution https:youtube77g0y5itus4
entitlement administration amp governance

http:hitachi-idcoma fresh approach to managing users and their access rightswatch our webinar from wednesday april 25th 10ampt11ammt1pm et when hitachi id cto idan shoham discussed entitlement administration amp governance - a fresh approach to managing users and their access rightsthe market for managing identities credentials and security entitlements has evolved radically over the years it started out with directories then moved on to processes and automation to manage identities in those directories identity management the grew to include web single sign-on identity and access management and more recently to include policy and controls access governancein this session idan shoham hitachi id systems cto introduced the next logical evolution: entitlement administration and governancethis term is proposed in recognition of the fact that most organizations are primarily interested in managing what their users can access and only secondarily in identity attributes moreover routine administration processes are tightly coupled with governance access policy audit and other controlsthe session will clarify why any approach that treats the management of identities separately from entitlements or considers administration and governance as distinct and separate are doomed to create more problems than they solvehttp:hitachi-idcomcgi-binemaildocdocument=entitlement-administration-governancewmv
transparent password synchronization: realistic scenario with load balancing and feedback loops

http:hitachi-idcomtransparent password synchronization: realistic scenario with load balancing and feedback loopscontent:- illustrate the flow of a new password during password synchronization- highlight interactions with load balancers multiple hipm systems and multiple trigger systems- show how hipm prevents feedback loopskey concepts:- reducing the number of passwords users must remember- ensuring that password synchronization does not introduce feedback loops on the network- illustrate the advanced architecture to properly scale up a password synchronization systemto view more concept animations visit: http:hitachi-idcompassword-manageroverviewconcept-animationshtml
hitachi id password manager - help locked out user with domain secure kiosk account

http:hitachi-idcomhelp locked out user with domain secure kiosk accountcontent:- user locks out windows login password- user signs in with a domain-level secure kiosk account- a kiosk-mode web browser is launched- user enters his network login id- user answers security questions- user chooses a new password- web browser is closed- user signs into windows with the new passwordkey concepts:- access to self-service password reset from a locked out pc- no client software is installed on the pcto view more concept animations visit: http:hitachi-idcompassword-manageroverviewconcept-animationshtml
hitachi id password manager - enrolling a lotus notes id file using an extension dll

http:hitachi-idcomenrolling a lotus notes id file using an extension dllcontent:- hipm collects copies of user id files and passwords from user pcs using a notes extension dllkey concepts:- automatic enrollment and update of id files- process is invisible to users- minimal client footprint a single dllto view more concept animations visit: http:hitachi-idcompassword-manageroverviewconcept-animationshtml
orphan and dormant accounts

hitachi-idcomorphan and dormant accountscontent: shows accounts with no known ownerkey concepts: built-in reports make it easy to find orphan and dormant accounts: orphan users are user profiles with no login accounts orphan accounts have no known owner dormant accounts have had no recent login activity dormant profiles have all-dormant accountssee more at: http:hitachi-idcomidentity-manageroverviewreportshtml
immediate deactivation triggered by hr sor

hitachi-idcomimmediate deactivation triggered by hr sorcontent: the hr system of record can specify that a user should be deactivated immediately rather than on a scheduled date this means that when the batch process runs to read hr data it will deactivate the userkey concepts: changes to identity data attribute value disappearance of a user etc in a sor can drive actions other than just attribute changes to a user039s profile in this case the required change is immediately disabling the user urgent normally does not require approvalssee more at: http:hitachi-idcomidentity-manageroverviewterminationhtml
scheduled termination

hitachi-idcomscheduled terminationcontent: a manager schedules terminationdeactivation for one of his subordinates members of the hr department are invited to approve the changekey concepts: scheduled events such as deactivation are modeled using a date attribute in the user039s profile access controls determine who can see this date who can request a change and who must approve a change in this example a user039s manager and anyone in hr can seeedit this date but the user cannot if the manager requests a change hr must approve it conversely if hr requests a change the manager will be asked to approve it once the request is approved and stored in the user039s profile other processes take care of the deactivation process the workflow component is simply for setting this datesee more at: http:hitachi-idcomidentity-manageroverviewterminationhtml
art restoration services provided - client039s testimonials

this very short fast paced video shows art restoration services provided and client039s testimonials by scott m haskins and fine art conservation laboratories in la-oc contact info 805 564 3438 faclartdocgmailcomdoor to door serviced provided in southern california santa monica west los angeles beverly hills los angeles orange county tustin laguna beach san juan capistrano san diego monterey ca las vegas nevada and salt lake city utah facl works with clients all over the usa we often do mural restoration project nationwide and consult internationally https:wwwyoutubecomwatchv=yho5a9l_rva
hitachi id password manager - self-service reset for a forgotten or locked out smart card pin

http:hitachi-idcomself-service reset for a forgotten or locked out smart card pincontent:- user forgets the pin to his smart card- user presses a quothelpquot button to access self-service- a kiosk-mode web browser is launched- user enters his network login id- user answers security questions- user chooses a new pin for his smart card- activex runs on the user039s pc unblocks the card and injects the new pin- user signs into windows with the smart card and new pinkey concepts:- access to self-service password reset from a locked out pc- pin reset is available on-site and also while mobile via temporary vpn- activex is used to communicate with the smart card reader unblock the card and set the new pinto view more concept animations visit: http:hitachi-idcompassword-manageroverviewconcept-animationshtml
violations of segregation of duties rules

hitachi-idcomviolations of segregation of duties rulescontent: finds users who violate any segregation of duties sod rule finds users whose violation of an sod rule has been approvedkey concepts: sod reports are a detective control -- ie they find already-existing violations there is also a preventive control embedded in the change request workflow sod violations may be approved for example if they are a legitimate situation that the policy did not take into accountsee more at: http:hitachi-idcomidentity-manageroverviewreportshtml
violations of segregation of duties rules

http:hitachi-idcomviolations of segregation of duties rulescontent: finds users who violate any segregation of duties sod rule finds users whose violation of an sod rule has been approvedkey concepts: sod reports are a detective control -- ie they find already-existing violations there is also a preventive control embedded in the change request workflow sod violations may be approved for example if they are a legitimate situation that the policy did not take into accountsee more at: http:hitachi-idcomidentity-manageroverviewreportshtml
immediate deactivation initiated by manager requiring approval

hitachi-idcomimmediate deactivation initiated by manager requiring approvalcontent: a manager can log into identity manager and deactivate an employee immediately this kind of process typically does require approval by hrkey concepts: the user is deactivated but only once the request is approved managers are generally only allowed to do this to their direct reports hr users are generally allowed to do this to anyone at least outside of hr and executive groupssee more at: http:hitachi-idcomidentity-manageroverviewterminationhtml