Deck 10: Identity Management

ملء الشاشة (f)
exit full mode
سؤال
5)In the Internet world, most certificates follow the LDAP standard defined in RFC 2459 by IETF.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
9)The IdM platform gets all of its identity data from the ____.

A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
سؤال
8)The IdM ____ provide common services for all the components within the IdM platform.

A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
سؤال
16)In ____ modeling, the administrator programs a set of rules that would apply to the identity data set.

A) rule-based
B) role-based
C) location-based
D) group-based
سؤال
14)The ____ engine provides the means of subdividing the management of the huge amount of identity data that an IdM system processes.

A) modeling
B) delegated administration
C) audit
D) workflow
سؤال
19)____ is defined as a business process to service a request associated with an identity.

A) Workflow
B) DN
C) Provisioning
D) Data broker
سؤال
10)A(n) ____ allows users or applications to find resources that have characteristics needed for a particular task.

A) access manager
B) password manager
C) data store
D) system of records
سؤال
18)The entity needs to remember only one strong password to access all resources instead of trying to remember and manage different passwords for different systems. We call this ____.

A) password recycling
B) password reuse
C) password grouping
D) password synchronization
سؤال
2)Data in an X.500 directory is organized in a linear name space capable of supporting large amounts of information.
سؤال
17)The ____ component as an IdM infrastructure is an end-to-end framework for capturing identity and security operational logs.

A) data broker
B) DA engine
C) audit
D) workflow engine
سؤال
12)____ is a mechanism for defining a collection of attributes for the instantiation of a directory entry.

A) Object class (OC)
B) Distinguished name (DN)
C) Secondary identifying document (SID)
D) Identifying characteristics (IC)
سؤال
13)____ is defined as the procedural steps, the identity involved, the required input, and the output of resources needed to produce a given result such as a product or service.

A) Entity
B) Audit
C) Data broker
D) Workflow
سؤال
11)The job of the ____ component is to process identity information.

A) access manager
B) data broker
C) password manager
D) system records
سؤال
6)A(n) ____ is defined as an object that has separate and distinct existence with objective or conceptual reality.

A) characteristic
B) distinguished name
C) identity
D) entity
سؤال
7)____ is a standard document that refers to the identity of an entity.

A) IC
B) SIC
C) SID
D) PID
سؤال
20)The ____ works with infrastructure services in the IdM platform to provide replicable rules for repeatable automated workflow for provisioning accounts and other services associated with an identity.

A) provisioning module
B) audit module
C) password management module
D) workflow module
سؤال
15)The goal of the ____ is to model the identity data set into a particular format.

A) DA engine
B) workflow engine
C) data broker
D) modeling module
سؤال
3)Data entries in LDAP directory are arranged in a hierarchical structure that reflects political, geographic, and/or organizational boundaries.
سؤال
4)A password can be both strong and easy to remember at the same time.
سؤال
1)Security enhancement and cost savings are the two major reasons for identity management.
سؤال
31)Under the IDIM model, the core of the IdM platform is the IdM ____________________.
سؤال
39)What are some of the characteristics of a poor/weak password?
سؤال
22)A(n) ____ is an electronic document used to identify an individual, a company, or any other entity.

A) SPML certificate
B) DN certificate
C) digital certificate
D) CA certificate
سؤال
28)____________________ is a collection of information about objects arranged in some order that gives details about each object.
سؤال
34)Briefly describe the Universal ID approach.
سؤال
23)The ____ in the IdM platform is a specialized module that provides PKI-related services.

A) password management module
B) PKIM
C) SPML
D) provisioning module
سؤال
25)____ is the ability to determine what data an identity can view, alter, create, or delete and/or what systems that identity can change.

A) Identity
B) Entity
C) Authentication
D) Authorization
سؤال
36)What are the primary goals for IdM in the private sector?
سؤال
41)What are the main characteristics of passphrases?
سؤال
29)____________________ is the suite of communications protocols used to connect hosts on the Internet.
سؤال
26)____ is a XML-based framework for Web services that enables the exchange of authentication and authorization information among different organizations.

A) SMPL
B) SAML
C) LDAP
D) X.500
سؤال
27)____________________ refers to a set of technologies intended to manage a basic issue: information about the identity of users, employees, contractors, customers, partners, and vendors is distributed among too many systems and is consequently difficult to manage securely.
سؤال
24)____ is the assurance that an identity to some computerized transaction is not an impostor.

A) Authentication
B) Identity
C) Authorization
D) Entity
سؤال
21)____ is developed as a standard from OASIS using an XML-based framework for exchanging user, resource, and service provisioning information between cooperating organizations.

A) X.500
B) SPML
C) LDAP
D) OSI
سؤال
What are some of the characteristics of a strong password?
سؤال
37)Describe the main characteristics of a virtual directory.
سؤال
35)Briefly described the Clustered ID approach.
سؤال
33)What are some other fields or areas that are combined with security technology when providing a security solution?
سؤال
38)What are the RFC that define LDAP version 3?
سؤال
30)Each LDAP directory entry is a collection of attributes with a unique name called a(n) ____________________.
سؤال
Match between columns
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Identity
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Password management module
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
OSI
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Role-based modeling
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Identity data layer
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
JNDI
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
IdM system
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Workflow instance
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
LDAP
a set of identifiers associated with an entity
Identity
a set of identifiers associated with an entity
Password management module
a set of identifiers associated with an entity
OSI
a set of identifiers associated with an entity
Role-based modeling
a set of identifiers associated with an entity
Identity data layer
a set of identifiers associated with an entity
JNDI
a set of identifiers associated with an entity
IdM system
a set of identifiers associated with an entity
Workflow instance
a set of identifiers associated with an entity
LDAP
designed to handle any complexity involved in password management under the IDIM model
Identity
designed to handle any complexity involved in password management under the IDIM model
Password management module
designed to handle any complexity involved in password management under the IDIM model
OSI
designed to handle any complexity involved in password management under the IDIM model
Role-based modeling
designed to handle any complexity involved in password management under the IDIM model
Identity data layer
designed to handle any complexity involved in password management under the IDIM model
JNDI
designed to handle any complexity involved in password management under the IDIM model
IdM system
designed to handle any complexity involved in password management under the IDIM model
Workflow instance
designed to handle any complexity involved in password management under the IDIM model
LDAP
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Identity
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Password management module
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
OSI
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Role-based modeling
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Identity data layer
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
JNDI
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
IdM system
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Workflow instance
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
LDAP
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Identity
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Password management module
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
OSI
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Role-based modeling
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Identity data layer
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
JNDI
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
IdM system
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Workflow instance
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
LDAP
a Java API that provides naming and directory functionality to Java applications
Identity
a Java API that provides naming and directory functionality to Java applications
Password management module
a Java API that provides naming and directory functionality to Java applications
OSI
a Java API that provides naming and directory functionality to Java applications
Role-based modeling
a Java API that provides naming and directory functionality to Java applications
Identity data layer
a Java API that provides naming and directory functionality to Java applications
JNDI
a Java API that provides naming and directory functionality to Java applications
IdM system
a Java API that provides naming and directory functionality to Java applications
Workflow instance
a Java API that provides naming and directory functionality to Java applications
LDAP
contains all the data sources from an organization where identity-related information is stored
Identity
contains all the data sources from an organization where identity-related information is stored
Password management module
contains all the data sources from an organization where identity-related information is stored
OSI
contains all the data sources from an organization where identity-related information is stored
Role-based modeling
contains all the data sources from an organization where identity-related information is stored
Identity data layer
contains all the data sources from an organization where identity-related information is stored
JNDI
contains all the data sources from an organization where identity-related information is stored
IdM system
contains all the data sources from an organization where identity-related information is stored
Workflow instance
contains all the data sources from an organization where identity-related information is stored
LDAP
has become the de facto standard of both stand-alone directory and virtual directory technologies
Identity
has become the de facto standard of both stand-alone directory and virtual directory technologies
Password management module
has become the de facto standard of both stand-alone directory and virtual directory technologies
OSI
has become the de facto standard of both stand-alone directory and virtual directory technologies
Role-based modeling
has become the de facto standard of both stand-alone directory and virtual directory technologies
Identity data layer
has become the de facto standard of both stand-alone directory and virtual directory technologies
JNDI
has become the de facto standard of both stand-alone directory and virtual directory technologies
IdM system
has become the de facto standard of both stand-alone directory and virtual directory technologies
Workflow instance
has become the de facto standard of both stand-alone directory and virtual directory technologies
LDAP
a combination of states and transitions that make up a process
Identity
a combination of states and transitions that make up a process
Password management module
a combination of states and transitions that make up a process
OSI
a combination of states and transitions that make up a process
Role-based modeling
a combination of states and transitions that make up a process
Identity data layer
a combination of states and transitions that make up a process
JNDI
a combination of states and transitions that make up a process
IdM system
a combination of states and transitions that make up a process
Workflow instance
a combination of states and transitions that make up a process
LDAP
سؤال
42)What are the main characteristics of UDDI?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Identity Management
1
5)In the Internet world, most certificates follow the LDAP standard defined in RFC 2459 by IETF.
False
2
9)The IdM platform gets all of its identity data from the ____.

A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
B
3
8)The IdM ____ provide common services for all the components within the IdM platform.

A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
A
4
16)In ____ modeling, the administrator programs a set of rules that would apply to the identity data set.

A) rule-based
B) role-based
C) location-based
D) group-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
14)The ____ engine provides the means of subdividing the management of the huge amount of identity data that an IdM system processes.

A) modeling
B) delegated administration
C) audit
D) workflow
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
19)____ is defined as a business process to service a request associated with an identity.

A) Workflow
B) DN
C) Provisioning
D) Data broker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
10)A(n) ____ allows users or applications to find resources that have characteristics needed for a particular task.

A) access manager
B) password manager
C) data store
D) system of records
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
18)The entity needs to remember only one strong password to access all resources instead of trying to remember and manage different passwords for different systems. We call this ____.

A) password recycling
B) password reuse
C) password grouping
D) password synchronization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
2)Data in an X.500 directory is organized in a linear name space capable of supporting large amounts of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
17)The ____ component as an IdM infrastructure is an end-to-end framework for capturing identity and security operational logs.

A) data broker
B) DA engine
C) audit
D) workflow engine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
12)____ is a mechanism for defining a collection of attributes for the instantiation of a directory entry.

A) Object class (OC)
B) Distinguished name (DN)
C) Secondary identifying document (SID)
D) Identifying characteristics (IC)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
13)____ is defined as the procedural steps, the identity involved, the required input, and the output of resources needed to produce a given result such as a product or service.

A) Entity
B) Audit
C) Data broker
D) Workflow
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
11)The job of the ____ component is to process identity information.

A) access manager
B) data broker
C) password manager
D) system records
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
6)A(n) ____ is defined as an object that has separate and distinct existence with objective or conceptual reality.

A) characteristic
B) distinguished name
C) identity
D) entity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
7)____ is a standard document that refers to the identity of an entity.

A) IC
B) SIC
C) SID
D) PID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
20)The ____ works with infrastructure services in the IdM platform to provide replicable rules for repeatable automated workflow for provisioning accounts and other services associated with an identity.

A) provisioning module
B) audit module
C) password management module
D) workflow module
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
15)The goal of the ____ is to model the identity data set into a particular format.

A) DA engine
B) workflow engine
C) data broker
D) modeling module
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
3)Data entries in LDAP directory are arranged in a hierarchical structure that reflects political, geographic, and/or organizational boundaries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
4)A password can be both strong and easy to remember at the same time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
1)Security enhancement and cost savings are the two major reasons for identity management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
31)Under the IDIM model, the core of the IdM platform is the IdM ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
39)What are some of the characteristics of a poor/weak password?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
22)A(n) ____ is an electronic document used to identify an individual, a company, or any other entity.

A) SPML certificate
B) DN certificate
C) digital certificate
D) CA certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
28)____________________ is a collection of information about objects arranged in some order that gives details about each object.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
34)Briefly describe the Universal ID approach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
23)The ____ in the IdM platform is a specialized module that provides PKI-related services.

A) password management module
B) PKIM
C) SPML
D) provisioning module
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
25)____ is the ability to determine what data an identity can view, alter, create, or delete and/or what systems that identity can change.

A) Identity
B) Entity
C) Authentication
D) Authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
36)What are the primary goals for IdM in the private sector?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
41)What are the main characteristics of passphrases?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
29)____________________ is the suite of communications protocols used to connect hosts on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
26)____ is a XML-based framework for Web services that enables the exchange of authentication and authorization information among different organizations.

A) SMPL
B) SAML
C) LDAP
D) X.500
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
27)____________________ refers to a set of technologies intended to manage a basic issue: information about the identity of users, employees, contractors, customers, partners, and vendors is distributed among too many systems and is consequently difficult to manage securely.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
24)____ is the assurance that an identity to some computerized transaction is not an impostor.

A) Authentication
B) Identity
C) Authorization
D) Entity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
21)____ is developed as a standard from OASIS using an XML-based framework for exchanging user, resource, and service provisioning information between cooperating organizations.

A) X.500
B) SPML
C) LDAP
D) OSI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are some of the characteristics of a strong password?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
37)Describe the main characteristics of a virtual directory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
35)Briefly described the Clustered ID approach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
33)What are some other fields or areas that are combined with security technology when providing a security solution?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
38)What are the RFC that define LDAP version 3?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
30)Each LDAP directory entry is a collection of attributes with a unique name called a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Identity
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Password management module
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
OSI
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Role-based modeling
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Identity data layer
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
JNDI
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
IdM system
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Workflow instance
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
LDAP
a set of identifiers associated with an entity
Identity
a set of identifiers associated with an entity
Password management module
a set of identifiers associated with an entity
OSI
a set of identifiers associated with an entity
Role-based modeling
a set of identifiers associated with an entity
Identity data layer
a set of identifiers associated with an entity
JNDI
a set of identifiers associated with an entity
IdM system
a set of identifiers associated with an entity
Workflow instance
a set of identifiers associated with an entity
LDAP
designed to handle any complexity involved in password management under the IDIM model
Identity
designed to handle any complexity involved in password management under the IDIM model
Password management module
designed to handle any complexity involved in password management under the IDIM model
OSI
designed to handle any complexity involved in password management under the IDIM model
Role-based modeling
designed to handle any complexity involved in password management under the IDIM model
Identity data layer
designed to handle any complexity involved in password management under the IDIM model
JNDI
designed to handle any complexity involved in password management under the IDIM model
IdM system
designed to handle any complexity involved in password management under the IDIM model
Workflow instance
designed to handle any complexity involved in password management under the IDIM model
LDAP
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Identity
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Password management module
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
OSI
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Role-based modeling
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Identity data layer
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
JNDI
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
IdM system
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Workflow instance
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
LDAP
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Identity
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Password management module
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
OSI
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Role-based modeling
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Identity data layer
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
JNDI
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
IdM system
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Workflow instance
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
LDAP
a Java API that provides naming and directory functionality to Java applications
Identity
a Java API that provides naming and directory functionality to Java applications
Password management module
a Java API that provides naming and directory functionality to Java applications
OSI
a Java API that provides naming and directory functionality to Java applications
Role-based modeling
a Java API that provides naming and directory functionality to Java applications
Identity data layer
a Java API that provides naming and directory functionality to Java applications
JNDI
a Java API that provides naming and directory functionality to Java applications
IdM system
a Java API that provides naming and directory functionality to Java applications
Workflow instance
a Java API that provides naming and directory functionality to Java applications
LDAP
contains all the data sources from an organization where identity-related information is stored
Identity
contains all the data sources from an organization where identity-related information is stored
Password management module
contains all the data sources from an organization where identity-related information is stored
OSI
contains all the data sources from an organization where identity-related information is stored
Role-based modeling
contains all the data sources from an organization where identity-related information is stored
Identity data layer
contains all the data sources from an organization where identity-related information is stored
JNDI
contains all the data sources from an organization where identity-related information is stored
IdM system
contains all the data sources from an organization where identity-related information is stored
Workflow instance
contains all the data sources from an organization where identity-related information is stored
LDAP
has become the de facto standard of both stand-alone directory and virtual directory technologies
Identity
has become the de facto standard of both stand-alone directory and virtual directory technologies
Password management module
has become the de facto standard of both stand-alone directory and virtual directory technologies
OSI
has become the de facto standard of both stand-alone directory and virtual directory technologies
Role-based modeling
has become the de facto standard of both stand-alone directory and virtual directory technologies
Identity data layer
has become the de facto standard of both stand-alone directory and virtual directory technologies
JNDI
has become the de facto standard of both stand-alone directory and virtual directory technologies
IdM system
has become the de facto standard of both stand-alone directory and virtual directory technologies
Workflow instance
has become the de facto standard of both stand-alone directory and virtual directory technologies
LDAP
a combination of states and transitions that make up a process
Identity
a combination of states and transitions that make up a process
Password management module
a combination of states and transitions that make up a process
OSI
a combination of states and transitions that make up a process
Role-based modeling
a combination of states and transitions that make up a process
Identity data layer
a combination of states and transitions that make up a process
JNDI
a combination of states and transitions that make up a process
IdM system
a combination of states and transitions that make up a process
Workflow instance
a combination of states and transitions that make up a process
LDAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
42)What are the main characteristics of UDDI?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.