In this video, you will learn about the disadvantages of SSO. The disadvantages of SSO are: losing access to your main account can compromise all related accounts latency risks unnecessary …
In this video, you will learn what single sign on (SSO) is, its importance in the IdAM context, and some of its advantages. SSO is the use of a single …
In this video, you will dive deeper into the topic of trends and learn about some of the common problems in IdAM, such as privilege creep. Remember, at a minimum, …
In this video, you will learn about some trends for the IdAM context, such as information privacy. You will also learn about the standards that support these trends, such as …
In this video, you will learn about Open Authorization (OAuth). We will cover what it is, its versions, how it fits into the context, and important processes that occur when …
In this video, you will learn about other key standards used in the IdAM context. Key standards are: National Strategy for Trusted Identities in Cyberspace NIST Cybersecurity Practice Guide 1800-2 …
In this video, you will be introduced to important guidelines and standards in the IdAM context. These are defined, existing approaches that will inform the larger strategy you take in …
In this video, you will learn about a newer technology called security assertion mark-up language (SAML). SAML is an open standard developed by OASIS Group and uses XML. It handles …
In this video, you will learn about the different SSL versions, and how it evolved to transport layer security (TLS). Reflect and share: In IdAM, the aim is to balance …
In this video, you will learn about documentation and training. Remember, this is not a once off process. Rather, it will be a living document and ongoing process to ensure …
In this video, you will be introduced to resource implications, user acceptance, and migration in the IdAM implementation stage. Resource implications In the IdAM context, we would need to consult …
In this video, you will learn more about design architecture and the key aspects to consider. Design architecture seeks to understand the physical security requirements, such as data at rest …
In this video, you will be introduced to the factors that contribute to the design architecture of your identity and access management solution. The factors that contribute to the design …
In this video, you will learn about technical requirement use cases, which cover a range of considerations. Business and functional requirements must be aligned with technical requirements. Once you have …
In this video, you will learn about some important use cases to help you understand the requirements from real-world examples. The use cases covered will touch on the following: functional …