Open Framework, Information Management Strategy & Collaborative Governance | Data & Social Methodology - MIKE2.0 Methodology
Wiki Home
Collapse Expand Close

Members
Collapse Expand Close

To join, please contact us.

Improve MIKE 2.0
Collapse Expand Close
Need somewhere to start? How about the most wanted pages; or the pages we know need more work; or even the stub that somebody else has started, but hasn't been able to finish. Or create a ticket for any issues you have found.

Identity and Access Management Design Deliverable Template

From MIKE2.0 Methodology

Share/Save/Bookmark
Jump to: navigation, search
Under review.png
This article is a stub. It is currently undergoing major changes as it is in the very early stages of development and is only a placeholder. Please help improve MIKE2.0 by adding to this article.
This deliverable template is used to describe a sample of the MIKE2.0 Methodology (typically at a task level). More templates are now being added to MIKE2.0 as this has been a frequently requested aspect of the methodology. Contributors are strongly encouraged to assist in this effort.
Deliverable templates are illustrative as opposed to fully representative. Please help add examples to this template that are representative of the proposed output.

Identity and Access Management ensures that the user accessing the system is who they claim to be, thereby protecting systems from incorrect usage. It also protects users by informing them through:

  • Stating how their personal information will be used
  • Only using user information in the fashion that is stated
  • By protecting user information from dissemination to other entities without stated permission

Authentication is generally the key design feature from a technical perspective. It may involve use of simple password logins or more advanced forms of authentication such as the use of security tokens or biometrics so it goes across network, host, application and data security. The authentication design may involve single-sign on across a federated systems environment.

Examples

Example 1 - Identity and Access Management Design

Wiki Contributors
Collapse Expand Close