collect the videos you love
collect | share | explore
Tag results for identity
sort by: relevance | recent
Results from all user's collections (255 out of ~255)
hitachi id identity management suite 82 review and demo

http:hitachi-idcomhitachi id identity management suite 82 review and demoview our webinar from tuesday june 4th 1:00 pmet 11:00 am mt 10:00 am pt for a review and demo of our most recent release 82 the new version updates the privileged access manager hipam password manager hiim and password manager hipm products with major improvements to scalability high availability usability and many other important new featuresto view other webinars visit: http:hitachi-idcomaboutusnewsarchived-webinarshtml
alternative approaches to privileged access management

http:hitachi-idcomdoes it have to be about passwordsview our webinar from thursday april 11th 1:00 pmet 11:00 am mt 10:00 am pt when we discussed alternative approaches to privileged access managementto download this webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=alternative-approaches-to-privileged-accesswmv
immediate deactivation initiated by manager requiring approval

hitachi-idcomimmediate deactivation initiated by manager requiring approvalcontent: a manager can log into identity manager and deactivate an employee immediately this kind of process typically does require approval by hrkey concepts: the user is deactivated but only once the request is approved managers are generally only allowed to do this to their direct reports hr users are generally allowed to do this to anyone at least outside of hr and executive groupssee more at: http:hitachi-idcomidentity-manageroverviewterminationhtml
model-after user interface

hitachi-idcommodel-after user interfacecontent: a requester -- be it the user himself in a self-service request or the user039s manager -- may not know exactly what roles groups or attributes are needed to grant a recipient some required privileges however requesters often know someone else who already has the required privileges a model-after user interface allows a requester to compare the profile attributes and entitlements of the recipient with a model user and request just those items whose descriptions appear relevant to the task at handkey concepts: a requester can assign a subset of a model user039s rights to a recipient access controls limit what recipients and model user a given requester can access requests formulated in this way are user friendly -- the requester already knows who has the required entitlements just not what they are called selecting just key entitlements eliminates the problem of propagating rights from one over-provisioned user to anothersee more at: http:hitachi-idcomidentity-manageroverviewaccess-requestshtml
first login for new contractor

hitachi-idcomfirst login for new contractorcontent: a newly hired contractor signs in by answering security questions based on pii data driver039s license mother039s maiden name date of birth etc a random pin may also be sent to the user039s phone or personal e-mail address once authenticated the user must complete a profile of security questions answers the user resets his own password -- there was never a known shared password value the user may be asked to review and accept policy documents at first loginkey concepts: eliminate the need for predictable initial password capture security questions at first login get new users to read and accept policy documentssee more at: http:hitachi-idcomidentity-manageroverviewonboardinghtml
best practices for privileged access management pam

http:hitachi-idcombest practices for privileged access managementview our webinar from thursday january 31st 10ampt11ammt1pm et when we discussed best practices for privileged access management pam: from physical infrastructure and credential vaults to effective projects hitachi id will review best practices and current customer programsto download this webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=best-practices-for-privileged-access-managementwmv
the value of anonymity: a message to randi zuckerberg

i039d love to know what people are saying behind my back video transcript: http:zinniajonescomblogtranscriptsthe-value-of-anonymity-a-message-to-randi-zuckerberg follow me: http:twittercomzjemptv http:facebookcomzjemptv http:zinniajonescomblog
jenny kitty gets creampied after cheating on her man with her friend

watch jenny kitty gets creampied after cheating on her man with her friend 2025 jenny kitty runtime: 14:28 categories: jenny kitty cheating cheating wife mistaken identity wife s friend unexpected sex creampie confused husband doggystyle taboo pov ex girlfriends side fuck blowjob cowgirl cowgirl creampie jenny kitty hornyhill hornyhillse
hulu - endgame: gorillas in our midst - watch the full episode now

video description: smitten by a beautiful chinese cryptologist sam convinces balagan to try to solve an intricate puzzle involving a vital secret and an attractive conniving female journalist
obama - the truth about barry harrison bounel must see

the facts regarding obama aka barry soetoro now harrison j bounel as have been uncovered this clip speaks volumes about things he really doesn039t want us to know make of it what you will but the sources of this info are far more credible than mr obama has thus far proven to be from the very jump from day one i vowed to bring you the truth this is the truth as far as i have been able to discern like it or not
matt damon039s birthday wish

there039s one thing matt damon wants new yorkers to give him for his 40th birthday
hulu - endgame: mr black - watch the full episode now

video description: balagan is forced to match his chess skills against a computer when his anonymous online opponent reveals that he is playing for lethally high stakes - the lives of a group of innocent hostages
terminationdeactivation triggered by hr system of record sor

hitachi-idcomterminationdeactivation triggered by hr system of record sorcontent: a scheduled deactivation date can be set from a system of record changes from a sor are normally automatically approved the user039s manager will still get advance warning and may defer the datekey concepts: new values for identity attributes can be fed in from a system of record with no direct human interaction with hitachi id identity manager regardless of the data source all changes go through a workflow request which may or may not require approval once a value is set any processes which depend on the value proceed - regardless of the value039s source web portal request hr feed etcsee more at: http:hitachi-idcomidentity-manageroverviewterminationhtml
authorize scheduled termination

hitachi-idcomauthorize scheduled terminationcontent: approval of a change to a user039s scheduled termination date is handled by an hr user in this example three hr users were invited but any one of them can do the job -- increasing process reliability and shortening time to completionkey concepts: who is invited to approve a change is determined by policy policy is based on relationships between requester recipient and authorizer a random subset of a users eg members of an hr group can be chosen a further subset of invited users may be sufficient to approveinvitations go out via e-mail with responses via authenticated secure encrypted web formsee more at: http:hitachi-idcomidentity-manageroverviewterminationhtml
quotwho the hell am iquot tales of mere existence

and who the hell are you part one of the mini series quotperpetual identity crisisquot