Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Simple Cloud Identity Management (SCIM) protocol as candidate for (de)provisioning
  2. The recipe for privilege and access management
    1. Namespaces for privileges and expressing them through URI and URNs
    2. When to use groups , roles, privileges
    3. Role Hierarchies
    4. Working examples  of Access Management
  3. Using the paccman glossary in other MACE Working Groups
  4. Experiments with the Axiomatics Policy Engine
  5. How can privileges be provisioned into an existing application?
  6. Privileges for peasants
  7. A mace-wide access management glossary

...