You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 13 Next »

<< Prev Next >>

7.1 Do you have an enterprise Identity and Access Management roadmap?

 

Yes

No

In the process of creating one

UBC



(tick)

Michigan



(tick)

Cornell


(error)  


Georgetown

(tick)  



Ohio State

(tick)



UMUC

(tick)

 


UofT


 

(tick)

MIT

(tick)

 

 

UW-M

(tick)

 

 

UW

 

 

(tick)

UC-Irvine

(tick)

 

 

Colorado

 

 

(tick)

7.2 When applications invoke services on behalf of a user, are requests represented as coming from the user?

 

This is not a goal

This is an architecture goal but it is only sometimes implemented

This is generally implemented for services in the local domain

This is generally implemented for services in the local domain and in the cloud

Other

Ohio

 

 

 

 

 

UMUC

 

(tick)

 

 

 

UofT

 

(tick)

 

 

 

MIT

 

 

(tick)

 

 

UW-M

 

(tick)

 

 

 

UW

 

(tick)

 

 

 

UC-Irvine

 

(tick)

 

 

 

Colorado

 

(tick)

 

 

 

7.3 When applications invoke services, how do services authenticate the requests?

 

Locally developed solution for mutual authentication

An n-tier solution such as Shibboleth ECP or CILogon

Other

UMUC

 

 

WS-Security via SAML assertions

UofT

 

(tick)

 

MIT

(tick)

 

 

UW-M

(tick)

 

 

UW

 

(tick)

 

UC-Irvine

(tick)

 

 

Colorado

(tick)

 

 

7.4 After requests are authenticated, do services access another service to determine what the requestor is authorized to do?

 

This is not a goal

This is an architecture goal but it is only sometimes implemented

This is consistently implemented for services in the local domain

This is consistently implemented for services in the local domain and in the cloud

Other

UMUC

(tick)

 

 

 

 

UofT

 

(tick)

 

 

 

MIT

 

(tick)

 

 

 

UW-M

 

(tick)

 

 

 

UW

 

(tick)

 

 

 

UC-Irvine

 

 

(tick)

 

 

Colorado

 

(tick)

 

 

 

7.5 More generally, how do you manage trust between distributed components ?



<< Prev Next >>

  • No labels