<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://www.dolcera.com/wiki/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.dolcera.com/wiki/index.php?action=history&amp;feed=atom&amp;title=IDs_betw</id>
		<title>IDs betw - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://www.dolcera.com/wiki/index.php?action=history&amp;feed=atom&amp;title=IDs_betw"/>
		<link rel="alternate" type="text/html" href="https://www.dolcera.com/wiki/index.php?title=IDs_betw&amp;action=history"/>
		<updated>2026-04-15T04:59:19Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.24wmf12</generator>

	<entry>
		<id>https://www.dolcera.com/wiki/index.php?title=IDs_betw&amp;diff=4068&amp;oldid=prev</id>
		<title>521jingke8899 at 09:35, 25 September 2007</title>
		<link rel="alternate" type="text/html" href="https://www.dolcera.com/wiki/index.php?title=IDs_betw&amp;diff=4068&amp;oldid=prev"/>
				<updated>2007-09-25T09:35:25Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;September 24, 2007&lt;br /&gt;
Role Management and eSSO vendors - a call for action&lt;br /&gt;
Part of a successful Identity Management (IdM) project is a successful role discovery and mapping phase. Many organizations -- after having mapped and optimized their business processes -- turn to role design and management solutions (VAUU RBACx, BHOLD, Oracle's BridgeStream, and others). While these solutions give a great initial insight into the existing role structure, they are not the only source of role interrelationship information. Role design can build &lt;br /&gt;
&lt;br /&gt;
on&lt;br /&gt;
&lt;br /&gt;
many other sources: demographics mined from helpdesk tickets from users requesting access, job descriptions, quality management systems (it certain cases this is wishful thinking...), and increasingly from Enterprise or Desktop eSSO solutions (PassLogix, ActivIdentity, CA). eSSO solutions store multiple login cr[http://www.liaoxinbj.com/tese.htm  男子spa]edentials for users to multiple applications. As such, extracting account linkage, mapping and correlating user IDs between user repositories based &lt;br /&gt;
on&lt;br /&gt;
&lt;br /&gt;
access information built by end-users is much more reliable than an[http://www.liaoxinbj.com/ysg.htm  养生馆]y artificial role mining logic, usually based &lt;br /&gt;
on&lt;br /&gt;
&lt;br /&gt;
user repository attributes. This user mapping data could then be used as the[http://www.bjhrj.cn/product.htm 车库门] starting point of role discovery - maybe even &lt;br /&gt;
on&lt;br /&gt;
&lt;br /&gt;
a periodic basis. There is one technical problem today: smart data interchange between role mining and eSSO products does not exist. &lt;br /&gt;
&lt;br /&gt;
This post is a call for action for eSSO and role mining vendors to build these crossroads and help end users' struggles with defining provisioning roles in large organizations.&lt;br /&gt;
&lt;br /&gt;
Posted by Andras Cser at 08:38 AM in Identity and Access Management | Permalink &lt;br /&gt;
TrackBack&lt;br /&gt;
TrackBack URL for this entry:&lt;br /&gt;
http://www.typepad.com/t/trackback/146365/21785431&lt;br /&gt;
&lt;br /&gt;
Listed below are links to weblogs that reference Role Management and eSSO vendors - a call for action:&lt;/div&gt;</summary>
		<author><name>521jingke8899</name></author>	</entry>

	</feed>