Skip main navigation

Stakeholders at the Governance Phase

In this video, you will learn about the four different types of stakeholders and the importance of gaining their buy-in in the governance phase. Stakeholders to involve are: business owners …

The Business Case for Governance

In this video, you will learn about the business case for governance. Particularly, this speaks to the business drivers for IdAM such as improving operational efficiency and avoiding security incidents …

Deprovisioning

In this video, you will learn about the deprovisioning process; that is, removing access to a system. Once you have watched the video, consider the following: do you need to …

Monitoring, Access Reviews, and Reporting

In this video, you will learn about monitoring processes, access reviews, and reporting processes. Once you have watched the video, read the recap below: We need to monitor all processes. …

Credential Issuance and Managing Change

In this video, you will learn about credit issuance and managing change. When dealing with credential issuance processes, you should take the following into consideration: secure issuance process in-person verification …

The Provisioning Process

In this video, you will learn about the provisioning process. Once you have viewed the video, read the recap below: provisioning processes should link to the incident/case management system so …

Self-Service and Automation

In this video, you will learn about self-service and automation. An advantage of self-service processes is that it may help to reduce costs and increase efficiency. However, it can also …

Derived Credentials

In this video, you will learn about derived credentials, a strong type of authentication for mobile devices. Once you have viewed the video, read the recap below: derived credentials come …

The Credential Selection Process

In this video, you will learn about the credential selection process. Credentials can be used to authenticate a user or act as an identifier. The credential selection process needs to …

The Review and Approval Process

In this video, you will learn about the review and approval process. Once you have viewed the video, read through the following points: the review process typically refers to the …

What Processes Are Important?

In this video, you will learn about the importance of organizational processes and be introduced to the registration process. Organizational processes should consider the following: manual versus automated processes process …

Biometric Authentication Types

In this video, you will learn about the different biometric authentication types. In addition, each type will be compared in terms of its accuracy, invasiveness, acceptability, and throughput, to help …

Biometric Considerations

In this video, you will learn about biometric considerations and factors that can influence its effectiveness. The following biometric considerations will be covered: universality uniqueness measurability performance acceptability circumvention

Biometric Authentication

In this video, you will learn about biometric authentication. You will learn what it is, how it works, and see examples of it used in the IdAM context. Reflect and …

RFID Tokens

In this video, you will learn about radio frequency identification (RFID) tokens and their role and limitations in maintaining cybersecure processes related to authentication. Reflect and share: Once you’ve watched …