Tag results for authentication
sort by: relevance | recent
Results from all user's collections (66 out of ~66)

The results from your search appear low, try our web search for better results.
|
identity and access management in higher education
Bookmarked 579 weeks ago http:hitachi-idcomjoin hitachi id systems for an online discussion of the unique challenges the higher education community faces when implementing an identity management program:privacy user provisioningde-provisioning cost savings roiwe will review best practices around: access control authentication password management compliancesee more at: http:hitachi-idcomaboutusnewsarchived-webinarshtml |
|
outsourced idm administrator service
Bookmarked 579 weeks ago http:hitachi-idcomzvjezdan patz manager technical support will host an introductory session on hitachi id039s new outsourced idm administrator servicesee more at: http:hitachi-idcomaboutusnewsarchived-webinarshtml |
|
the role of relationships in identity and access management
Bookmarked 579 weeks ago http:hitachi-idcomview our webinar from tuesday august 27th 1:00 pmet 11:00 am mt 10:00 am pt when we discussed the role of relationships in identity and access managementtraditionally user rights inside iam systems have been expressed using organizational hierarchies this model does not fit well with real-world requirements howeverin this presentation we will introduce a more robust model for iam security: relationships between users relationships are a better foundation for a variety of security controls inside the iam system ranging from privacy protection to approvals workflowssee more at: http:hitachi-idcomaboutusnewsarchived-webinarshtml |
|
security policies roles and sod
Bookmarked 579 weeks ago http:hitachi-idcomthis webinar is about effective policy enforcement in a corporate identity management context including use of roles and segregation of duties to ensure that users get appropriate access rights and do not violate fraud-prevention rules an sod segration of duties policy that can be bypassed is perhaps worse than no policy at all - it gives the illusion of security without the reality hitachi id systems will review deep inspection sod rules and how users can be blocked from circumventing sod policysee more at: http:hitachi-idcomaboutusnewsarchived-webinarshtml |




