Sign In
Help


Identity Management Series – Role and Rule Basing Part 5: Implementation and Cleanup

The final step in this month’s activity is to implement the roles and clean up any extraneous access that’s left behind. As in the previous segment, the distinction between enterprise and IT roles doesn’t matter, so I will generalize. The reason for this is that what you implement depends on your strategy – as defined [...]


Related posts:
  1. Identity Management Series – Role- and Rule-Basing Part 4: Documentation and Approval

  2. Identity Management Series – Role- and Rule-Basing Part 1: Introduction

  3. Identity Management Series – Role- and Rule-Basing Part 2: Identifying & Prioritizing Enterprise Roles

List View
Most Popular
The Security Catalyst

The Security Catalyst