In this video, you will learn what it means to introduce strong authentication into your identity and access management solution. Strong authentication will incorporate, at the very least, two-factor authentication …
In this video, you will learn about authentication reuse. Authentication reuse refers to passwords, tokens or pins that cannot be reused. An example of this is a one-time pin for …
In this video, you will learn about authentication in the context of IdAM. Authentication can be thought of as three major processes: confirming the truth of an attribute confirming identity …
In this video, you will learn about the four identification levels. Each level, or security layer, has different requirements and the one you choose will depend on your context. Reflect …
In this video, identification proofing will be expanded. Specifically, we will look at credential issuance and uniqueness, as well as some best practices. We will also look at the different …
In this video, you will learn about self-assertion, linking to existing credentials or identities, and the different categories of supporting evidence within identification proofing. Categories of supporting evidence include: citizen …
In this video, you will learn about identification, which is all about trying to establish an identity. Reflect and share: After you have watched the video, consider the following: identification …
In this video, you will learn about the differences and dependencies between policies and procedures. These differences are important to know as they each require different information and result in …
In this video, you will learn about the importance of using policies and implementing procedures in effective IdAM. Reflect and share: Now that you have learned about policy and procedures …
In this video, you will learn about the difference between a centralized and distributed approach in IdAM. You will also learn about each of their advantages and disadvantages. Reflect and …
In this video, you will learn about the role of culture and awareness within the context of governance. For example, consider the term ‘the human firewall’. This refers to the …
In this video, you will learn about privileged access management; that is, the level of access available to different users. Specifically, it refers to the management of accounts that have …
In this video, you will be introduced to governance and how it relates to IdAM. This is an important topic in the course because it will affect the success of …
In this video, you will learn about two other IdAM examples: Business-to-Customer (B2C) and Government-to-Customer (G2C). Investigate and share: Again, find an article related to either B2C or G2C in …
In this video, you will learn about two IdAM examples: Business to Employee (B2E) and Business to Business (B2B), and how these manifest in context. Investigate and share: Find an …