You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
« Previous
Version 5
Next »
7.1 Do you have an enterprise Identity and Access Management roadmap?
|
Yes |
No |
In the process of creating one |
UBC |
|
|
In the process |
Michigan |
|
|
In the process |
Cornell |
|
No |
|
Georgetown |
Yes |
|
|
Ohio State |
Yes |
|
|
UMUC |
Yes |
|
|
UofT |
|
|
In the process |
7.2 When applications invoke services on behalf of a user, are requests represented as coming from the user?
7.3 When applications invoke services, how do services authenticate the requests?
7.4 After requests are authenticated, do services access another service to determine what the requestor is authorized to do?
7.5 More generally, how do you manage trust between distributed components ?