[Log In] []

Exploring the science and magic of Identity and Access Management
Friday, October 23, 2020

Identity and Access Management – Capability Model

Identity
Author: Mark Dixon
Friday, March 8, 2013
3:57 pm

In a recent twitter conversation with Andre Koot, he suggested that we needed innovation in both Identity Management and Access Management.  He referred me to his blog, entitled “Let’s Kill the IAM Acroynm.”  Andre suggested:

Identity Management is a process for managing the lifecycle of identities … Access Control is a whole different ballgame …

After reading his blog, it occurred to me that he and I defined those two terms a bit differently.  I promised Andre that I would blog about it.

The diagram below shows how we at Oracle talk about the broad area of Identity and Access Management – encompassing three general areas:

  1. Identity Governance is about making sure the right people are granted the right access rights and making sure the wrong ones aren’t
  2. Access Management is about enforcing those access rights, within specified policy, when users attempt to access a desire application or system
  3. Directory Services provides ways to control where identity information about users and accessed rights are stored.
Oracle IAM

Does this provide the right demarcation between the various functional areas?  It seems to resonate well with our customers, and provides a valuable model to aid communications.  I’d be happy to hear any feedback you have.

By the way, this diagram is more effective as a PowerPoint build slide.  Let me know and I’d be happy to send you a copy.

 

Oracle Event: Database Enterprise User Security

Identity, Information Security
Author: Mark Dixon
Wednesday, June 20, 2012
2:31 pm

One of the high-value benefits of an integrated Identity and Access Management platform is the ability to leverage a unified corporate directory as the primary authentication source for database access.

On July 11, 2012 at 08:00 am PDT, Oracle will host a webcast showing how Enterprise User Security (EUS) can be used to externalize and centrally manage database users in a directory server. The webcast will briefly introduce EUS, followed by a detailed discussion about the various directory options that are supported, including integration with Microsoft Active Directory. We’ll conclude with how to avoid common pitfalls deploying EUS with directory services.

Discussion topics will include:

  • Understanding EUS basics
  • Understanding EUS and directory integration options
  • Avoiding common EUS deployment mistakes

Make sure to register and mark this date on your calendar! – Click here to register.

Comments Off on Oracle Event: Database Enterprise User Security . Permalink . Trackback URL
 
Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.