Skip main navigation

The Disadvantages of SSO

In this video, you will learn about the disadvantages of SSO. The disadvantages of SSO are: losing access to your main account can compromise all related accounts latency risks unnecessary …

Understanding Single Sign On (SSO)

In this video, you will learn what single sign on (SSO) is, its importance in the IdAM context, and some of its advantages. SSO is the use of a single …

Trends and Common Issues

In this video, you will dive deeper into the topic of trends and learn about some of the common problems in IdAM, such as privilege creep. Remember, at a minimum, …

Trends

In this video, you will learn about some trends for the IdAM context, such as information privacy. You will also learn about the standards that support these trends, such as …

Open Authorization (OAuth)

In this video, you will learn about Open Authorization (OAuth). We will cover what it is, its versions, how it fits into the context, and important processes that occur when …

Introduction to Guidance and Standards

In this video, you will be introduced to important guidelines and standards in the IdAM context. These are defined, existing approaches that will inform the larger strategy you take in …

Security Assertion Mark-up Language (SAML)

In this video, you will learn about a newer technology called security assertion mark-up language (SAML). SAML is an open standard developed by OASIS Group and uses XML. It handles …

Secure Socket Layer (SSL) (Continued)

In this video, you will learn about the different SSL versions, and how it evolved to transport layer security (TLS). Reflect and share: In IdAM, the aim is to balance …

Training and Support

In this video, you will learn about documentation and training. Remember, this is not a once off process. Rather, it will be a living document and ongoing process to ensure …

Introduction to Design Architecture (Continued)

In this video, you will learn more about design architecture and the key aspects to consider. Design architecture seeks to understand the physical security requirements, such as data at rest …

Introduction to Design Architecture

In this video, you will be introduced to the factors that contribute to the design architecture of your identity and access management solution. The factors that contribute to the design …

Technical Requirements and Considerations

In this video, you will learn about technical requirement use cases, which cover a range of considerations. Business and functional requirements must be aligned with technical requirements. Once you have …

Some Important Use Cases

In this video, you will learn about some important use cases to help you understand the requirements from real-world examples. The use cases covered will touch on the following: functional …