You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

<< Prev Next >>

7.1 Do you have an enterprise Identity and Access Management roadmap?

 

Yes

No

In the process of creating one

UBC



(tick)

Michigan



(tick)

Cornell


(error)  


Georgetown

(tick)  



Ohio State

(tick)



UMUC

(tick)

 


UofT


 

(tick)

MIT

(tick)

 

 

UW-M

(tick)

 

 

UW

 

 

(tick)

UC-Irvine

(tick)

 

 

Colorado

 

 

(tick)

7.2 When applications invoke services on behalf of a user, are requests represented as coming from the user?

 

This is not a goal

This is an architecture goal but it is only sometimes implemented

This is generally implemented for services in the local domain

This is generally implemented for services in the local domain and in the cloud

Other

Ohio

 

 

 

 

 

UMUC

 

 

 

 

 

UofT

 

 

 

 

 

MIT

 

 

 

 

 

UW-M

 

 

 

 

 

UW

 

 

 

 

 

UC-Irvine

 

 

 

 

 

Colorado

 

 

 

 

 

7.3 When applications invoke services, how do services authenticate the requests?

7.4 After requests are authenticated, do services access another service to determine what the requestor is authorized to do?

7.5 More generally, how do you manage trust between distributed components ?



<< Prev Next >>

  • No labels