Skip main navigation

Strong Authentication

In this video, you will learn what it means to introduce strong authentication into your identity and access management solution. Strong authentication will incorporate, at the very least, two-factor authentication …

Authentication Reuse

In this video, you will learn about authentication reuse. Authentication reuse refers to passwords, tokens or pins that cannot be reused. An example of this is a one-time pin for …

Identification Levels

In this video, you will learn about the four identification levels. Each level, or security layer, has different requirements and the one you choose will depend on your context. Reflect …

What is Authentication?

In this video, you will learn about authentication in the context of IdAM. Authentication can be thought of as three major processes: confirming the truth of an attribute confirming identity …

Identification Proofing (Continued)

In this video, you will learn about self-assertion, linking to existing credentials or identities, and the different categories of supporting evidence within identification proofing. Categories of supporting evidence include: citizen …

Identification Proofing

In this video, identification proofing will be expanded. Specifically, we will look at credential issuance and uniqueness, as well as some best practices. We will also look at the different …

Key Concept: Identification

In this video, you will learn about identification, which is all about trying to establish an identity. Reflect and share: After you have watched the video, consider the following: identification …

Policy and Procedure Comparison

In this video, you will learn about the differences and dependencies between policies and procedures. These differences are important to know as they each require different information and result in …

Culture and Awareness

In this video, you will learn about the role of culture and awareness within the context of governance. For example, consider the term ‘the human firewall’. This refers to the …

Centralized Versus Distributed Approach

In this video, you will learn about the difference between a centralized and distributed approach in IdAM. You will also learn about each of their advantages and disadvantages. Reflect and …

Policy and Procedures

In this video, you will learn about the importance of using policies and implementing procedures in effective IdAM. Reflect and share: Now that you have learned about policy and procedures …

Privileged Access Management

In this video, you will learn about privileged access management; that is, the level of access available to different users. Specifically, it refers to the management of accounts that have …

Introduction to Governance

In this video, you will be introduced to governance and how it relates to IdAM. This is an important topic in the course because it will affect the success of …

B2E and B2B Examples

In this video, you will learn about two IdAM examples: Business to Employee (B2E) and Business to Business (B2B), and how these manifest in context. Investigate and share: Find an …

B2C and G2C Examples

In this video, you will learn about two other IdAM examples: Business-to-Customer (B2C) and Government-to-Customer (G2C). Investigate and share: Again, find an article related to either B2C or G2C in …