You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

7.1 Do you have an enterprise Identity and Access Management roadmap?

 

Yes

No

In the process of creating one

UBC



In the process

Michigan



In the process

Cornell


No 


Georgetown

Yes 



Ohio State

Yes



UMUC

Yes

 


UofT


 

In the process

7.2 When applications invoke services on behalf of a user, are requests represented as coming from the user?

7.3 When applications invoke services, how do services authenticate the requests?

7.4 After requests are authenticated, do services access another service to determine what the requestor is authorized to do?

7.5 More generally, how do you manage trust between distributed components ?
  • No labels