What are we currently working on ?
- Simple Cloud Identity Management (SCIM) protocol as candidate for (de)provisioning
- The recipe for privilege and access management
- Namespaces for privileges and expressing them through URI and URNs
- When to use groups , roles, privileges
- Role Hierarchies
- Working examples of Access Management
- Cloud Identity Management (SCIM) protocol as candidate for (de)provisioning
- Using the paccman glossary in other MACE Working Groups
- Experiments with the Axiomatics Policy Engine
- How can privileges be provisioned into an existing application?
- A mace-wide access management glossary