Download presentation
Presentation is loading. Please wait.
Published byLeon Chandler Modified over 9 years ago
1
By: Nikhil Bendre Gauri Jape
2
What is Identity? Digital Identity Attributes Role Relationship
3
Authentication ◦Who wants to access the system? Authorization ◦Defining the rights to access IDAM
4
Streamlines the access to resources Reduces the wastage of time Efficient Provisioning Reduces Administrative Cost Single Password Ensures greater user productivity
5
Software Engineering Architecture Scalability Need to standardize IDAM
6
Composed of ◦ Subjects ◦ Objects ◦ Access rights Types ◦ ACL ◦ RBAC ◦ ABAC ◦ CWAC
7
Access Control List Consists of list of subjects & objects with the access rights Example ◦ acl(file 1) = { (process 1, {read, write, own}), (process 2 {append}) } ◦ acl(process 1) = { (process 1, {read, write, execute, own}), (process 2, {read}) }
8
Role Based Access Control Consists of ◦ Group of users based on roles ◦ Permissions to roles Supports revocation of access High level specification possible
9
Attributes Based Access Control ◦ Grants access to the entities based on attributes Context Aware Access Control ◦ Access based on surrounding context of subjects or objects Both Support High Level Specification
10
Property of access control Single Login In Total Access to System Examples ◦ One Time Password ◦ Smart Cards
11
New token structure Conference key mechanism ◦ Secure way between service provider & identity provider Service token mechanism for IDAM
12
IDAM Access Control Models Single Sign On Sourceld Liberty
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.