Please enable JavaScript.
Coggle requires JavaScript to display documents.
Role based action control (Cryptography/PKI (Digital Signatures (Private…
Role based action control
Real-time workflow enabled provisioning
Administrative User Profile Management
Advanced Password policy management
Self Service User Profile management
View Update Manage
Password Management
Self Service Reset
Synchronization
Provisioning Request
Auditing
Who, when and from a resource was accessed
Attestation
Certify that only appropriate individuals have access
Structure and Function
Access and Authorization
Policy - Role Based Access / Authorization
"Now that I've been authenticated"
"I want to see my grade for UDC Identity 101."
Orchestrate SSO via Access Gates and Web Gates
Both web and non-web native applications
Benefits
Protection
Enforcement
Efficiency
Cryptography/PKI
Shared Secrets
Symmetric encryption/decryption
Secret must be kept confidential between involved parties
Public Key/Private Key
Aysmmetic encryption/decryption
Private key must be kept in confidentially
Digital Signatures
Private key signing
Public key verifying
Message digest
Digital Certificates
Attaching identifiable information to the public key
Which has been digital signed to validate authenticity