Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. The recipe for privilege and access management
  2. Preparation for the August 8 AIM online online 
  3. Looking at selected use cases with a policy service perspective approach, and modeling using XACML terminology (PAP, PIP, PEP, PDP)
  4. Simple Cloud Identity Management (SCIM) protocol as candidate for (de)provisioning
    1. Namespaces for privileges and expressing them through URI and URNs
    2. When to use groups , roles, privileges
    3. Role Hierarchies
    4. Working examples  of Access Management
  5. Using the paccman glossary in other MACE Working Groups
  6. Experiments with the Axiomatics Policy Engine
  7. How can privileges be provisioned into an existing application?
  8. A mace-wide access management glossary

...