Deck 10: Identity Management

Full screen (f)
exit full mode
Question
5)In the Internet world, most certificates follow the LDAP standard defined in RFC 2459 by IETF.
Use Space or
up arrow
down arrow
to flip the card.
Question
9)The IdM platform gets all of its identity data from the ____.

A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
Question
8)The IdM ____ provide common services for all the components within the IdM platform.

A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
Question
16)In ____ modeling, the administrator programs a set of rules that would apply to the identity data set.

A) rule-based
B) role-based
C) location-based
D) group-based
Question
14)The ____ engine provides the means of subdividing the management of the huge amount of identity data that an IdM system processes.

A) modeling
B) delegated administration
C) audit
D) workflow
Question
19)____ is defined as a business process to service a request associated with an identity.

A) Workflow
B) DN
C) Provisioning
D) Data broker
Question
10)A(n) ____ allows users or applications to find resources that have characteristics needed for a particular task.

A) access manager
B) password manager
C) data store
D) system of records
Question
18)The entity needs to remember only one strong password to access all resources instead of trying to remember and manage different passwords for different systems. We call this ____.

A) password recycling
B) password reuse
C) password grouping
D) password synchronization
Question
2)Data in an X.500 directory is organized in a linear name space capable of supporting large amounts of information.
Question
17)The ____ component as an IdM infrastructure is an end-to-end framework for capturing identity and security operational logs.

A) data broker
B) DA engine
C) audit
D) workflow engine
Question
12)____ is a mechanism for defining a collection of attributes for the instantiation of a directory entry.

A) Object class (OC)
B) Distinguished name (DN)
C) Secondary identifying document (SID)
D) Identifying characteristics (IC)
Question
13)____ is defined as the procedural steps, the identity involved, the required input, and the output of resources needed to produce a given result such as a product or service.

A) Entity
B) Audit
C) Data broker
D) Workflow
Question
11)The job of the ____ component is to process identity information.

A) access manager
B) data broker
C) password manager
D) system records
Question
6)A(n) ____ is defined as an object that has separate and distinct existence with objective or conceptual reality.

A) characteristic
B) distinguished name
C) identity
D) entity
Question
7)____ is a standard document that refers to the identity of an entity.

A) IC
B) SIC
C) SID
D) PID
Question
20)The ____ works with infrastructure services in the IdM platform to provide replicable rules for repeatable automated workflow for provisioning accounts and other services associated with an identity.

A) provisioning module
B) audit module
C) password management module
D) workflow module
Question
15)The goal of the ____ is to model the identity data set into a particular format.

A) DA engine
B) workflow engine
C) data broker
D) modeling module
Question
3)Data entries in LDAP directory are arranged in a hierarchical structure that reflects political, geographic, and/or organizational boundaries.
Question
4)A password can be both strong and easy to remember at the same time.
Question
1)Security enhancement and cost savings are the two major reasons for identity management.
Question
31)Under the IDIM model, the core of the IdM platform is the IdM ____________________.
Question
39)What are some of the characteristics of a poor/weak password?
Question
22)A(n) ____ is an electronic document used to identify an individual, a company, or any other entity.

A) SPML certificate
B) DN certificate
C) digital certificate
D) CA certificate
Question
28)____________________ is a collection of information about objects arranged in some order that gives details about each object.
Question
34)Briefly describe the Universal ID approach.
Question
23)The ____ in the IdM platform is a specialized module that provides PKI-related services.

A) password management module
B) PKIM
C) SPML
D) provisioning module
Question
25)____ is the ability to determine what data an identity can view, alter, create, or delete and/or what systems that identity can change.

A) Identity
B) Entity
C) Authentication
D) Authorization
Question
36)What are the primary goals for IdM in the private sector?
Question
41)What are the main characteristics of passphrases?
Question
29)____________________ is the suite of communications protocols used to connect hosts on the Internet.
Question
26)____ is a XML-based framework for Web services that enables the exchange of authentication and authorization information among different organizations.

A) SMPL
B) SAML
C) LDAP
D) X.500
Question
27)____________________ refers to a set of technologies intended to manage a basic issue: information about the identity of users, employees, contractors, customers, partners, and vendors is distributed among too many systems and is consequently difficult to manage securely.
Question
24)____ is the assurance that an identity to some computerized transaction is not an impostor.

A) Authentication
B) Identity
C) Authorization
D) Entity
Question
21)____ is developed as a standard from OASIS using an XML-based framework for exchanging user, resource, and service provisioning information between cooperating organizations.

A) X.500
B) SPML
C) LDAP
D) OSI
Question
What are some of the characteristics of a strong password?
Question
37)Describe the main characteristics of a virtual directory.
Question
35)Briefly described the Clustered ID approach.
Question
33)What are some other fields or areas that are combined with security technology when providing a security solution?
Question
38)What are the RFC that define LDAP version 3?
Question
30)Each LDAP directory entry is a collection of attributes with a unique name called a(n) ____________________.
Question
Match between columns
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Identity
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Password management module
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
OSI
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Role-based modeling
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Identity data layer
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
JNDI
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
IdM system
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Workflow instance
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
LDAP
a set of identifiers associated with an entity
Identity
a set of identifiers associated with an entity
Password management module
a set of identifiers associated with an entity
OSI
a set of identifiers associated with an entity
Role-based modeling
a set of identifiers associated with an entity
Identity data layer
a set of identifiers associated with an entity
JNDI
a set of identifiers associated with an entity
IdM system
a set of identifiers associated with an entity
Workflow instance
a set of identifiers associated with an entity
LDAP
designed to handle any complexity involved in password management under the IDIM model
Identity
designed to handle any complexity involved in password management under the IDIM model
Password management module
designed to handle any complexity involved in password management under the IDIM model
OSI
designed to handle any complexity involved in password management under the IDIM model
Role-based modeling
designed to handle any complexity involved in password management under the IDIM model
Identity data layer
designed to handle any complexity involved in password management under the IDIM model
JNDI
designed to handle any complexity involved in password management under the IDIM model
IdM system
designed to handle any complexity involved in password management under the IDIM model
Workflow instance
designed to handle any complexity involved in password management under the IDIM model
LDAP
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Identity
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Password management module
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
OSI
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Role-based modeling
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Identity data layer
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
JNDI
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
IdM system
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Workflow instance
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
LDAP
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Identity
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Password management module
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
OSI
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Role-based modeling
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Identity data layer
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
JNDI
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
IdM system
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Workflow instance
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
LDAP
a Java API that provides naming and directory functionality to Java applications
Identity
a Java API that provides naming and directory functionality to Java applications
Password management module
a Java API that provides naming and directory functionality to Java applications
OSI
a Java API that provides naming and directory functionality to Java applications
Role-based modeling
a Java API that provides naming and directory functionality to Java applications
Identity data layer
a Java API that provides naming and directory functionality to Java applications
JNDI
a Java API that provides naming and directory functionality to Java applications
IdM system
a Java API that provides naming and directory functionality to Java applications
Workflow instance
a Java API that provides naming and directory functionality to Java applications
LDAP
contains all the data sources from an organization where identity-related information is stored
Identity
contains all the data sources from an organization where identity-related information is stored
Password management module
contains all the data sources from an organization where identity-related information is stored
OSI
contains all the data sources from an organization where identity-related information is stored
Role-based modeling
contains all the data sources from an organization where identity-related information is stored
Identity data layer
contains all the data sources from an organization where identity-related information is stored
JNDI
contains all the data sources from an organization where identity-related information is stored
IdM system
contains all the data sources from an organization where identity-related information is stored
Workflow instance
contains all the data sources from an organization where identity-related information is stored
LDAP
has become the de facto standard of both stand-alone directory and virtual directory technologies
Identity
has become the de facto standard of both stand-alone directory and virtual directory technologies
Password management module
has become the de facto standard of both stand-alone directory and virtual directory technologies
OSI
has become the de facto standard of both stand-alone directory and virtual directory technologies
Role-based modeling
has become the de facto standard of both stand-alone directory and virtual directory technologies
Identity data layer
has become the de facto standard of both stand-alone directory and virtual directory technologies
JNDI
has become the de facto standard of both stand-alone directory and virtual directory technologies
IdM system
has become the de facto standard of both stand-alone directory and virtual directory technologies
Workflow instance
has become the de facto standard of both stand-alone directory and virtual directory technologies
LDAP
a combination of states and transitions that make up a process
Identity
a combination of states and transitions that make up a process
Password management module
a combination of states and transitions that make up a process
OSI
a combination of states and transitions that make up a process
Role-based modeling
a combination of states and transitions that make up a process
Identity data layer
a combination of states and transitions that make up a process
JNDI
a combination of states and transitions that make up a process
IdM system
a combination of states and transitions that make up a process
Workflow instance
a combination of states and transitions that make up a process
LDAP
Question
42)What are the main characteristics of UDDI?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Identity Management
1
5)In the Internet world, most certificates follow the LDAP standard defined in RFC 2459 by IETF.
False
2
9)The IdM platform gets all of its identity data from the ____.

A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
B
3
8)The IdM ____ provide common services for all the components within the IdM platform.

A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
A
4
16)In ____ modeling, the administrator programs a set of rules that would apply to the identity data set.

A) rule-based
B) role-based
C) location-based
D) group-based
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
14)The ____ engine provides the means of subdividing the management of the huge amount of identity data that an IdM system processes.

A) modeling
B) delegated administration
C) audit
D) workflow
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
19)____ is defined as a business process to service a request associated with an identity.

A) Workflow
B) DN
C) Provisioning
D) Data broker
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
10)A(n) ____ allows users or applications to find resources that have characteristics needed for a particular task.

A) access manager
B) password manager
C) data store
D) system of records
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
18)The entity needs to remember only one strong password to access all resources instead of trying to remember and manage different passwords for different systems. We call this ____.

A) password recycling
B) password reuse
C) password grouping
D) password synchronization
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
2)Data in an X.500 directory is organized in a linear name space capable of supporting large amounts of information.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
17)The ____ component as an IdM infrastructure is an end-to-end framework for capturing identity and security operational logs.

A) data broker
B) DA engine
C) audit
D) workflow engine
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
12)____ is a mechanism for defining a collection of attributes for the instantiation of a directory entry.

A) Object class (OC)
B) Distinguished name (DN)
C) Secondary identifying document (SID)
D) Identifying characteristics (IC)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
13)____ is defined as the procedural steps, the identity involved, the required input, and the output of resources needed to produce a given result such as a product or service.

A) Entity
B) Audit
C) Data broker
D) Workflow
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
11)The job of the ____ component is to process identity information.

A) access manager
B) data broker
C) password manager
D) system records
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
6)A(n) ____ is defined as an object that has separate and distinct existence with objective or conceptual reality.

A) characteristic
B) distinguished name
C) identity
D) entity
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
7)____ is a standard document that refers to the identity of an entity.

A) IC
B) SIC
C) SID
D) PID
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
20)The ____ works with infrastructure services in the IdM platform to provide replicable rules for repeatable automated workflow for provisioning accounts and other services associated with an identity.

A) provisioning module
B) audit module
C) password management module
D) workflow module
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
15)The goal of the ____ is to model the identity data set into a particular format.

A) DA engine
B) workflow engine
C) data broker
D) modeling module
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
3)Data entries in LDAP directory are arranged in a hierarchical structure that reflects political, geographic, and/or organizational boundaries.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
4)A password can be both strong and easy to remember at the same time.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
1)Security enhancement and cost savings are the two major reasons for identity management.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
31)Under the IDIM model, the core of the IdM platform is the IdM ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
39)What are some of the characteristics of a poor/weak password?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
22)A(n) ____ is an electronic document used to identify an individual, a company, or any other entity.

A) SPML certificate
B) DN certificate
C) digital certificate
D) CA certificate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
28)____________________ is a collection of information about objects arranged in some order that gives details about each object.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
34)Briefly describe the Universal ID approach.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
23)The ____ in the IdM platform is a specialized module that provides PKI-related services.

A) password management module
B) PKIM
C) SPML
D) provisioning module
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
25)____ is the ability to determine what data an identity can view, alter, create, or delete and/or what systems that identity can change.

A) Identity
B) Entity
C) Authentication
D) Authorization
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
36)What are the primary goals for IdM in the private sector?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
41)What are the main characteristics of passphrases?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
29)____________________ is the suite of communications protocols used to connect hosts on the Internet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
26)____ is a XML-based framework for Web services that enables the exchange of authentication and authorization information among different organizations.

A) SMPL
B) SAML
C) LDAP
D) X.500
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
27)____________________ refers to a set of technologies intended to manage a basic issue: information about the identity of users, employees, contractors, customers, partners, and vendors is distributed among too many systems and is consequently difficult to manage securely.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
24)____ is the assurance that an identity to some computerized transaction is not an impostor.

A) Authentication
B) Identity
C) Authorization
D) Entity
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
21)____ is developed as a standard from OASIS using an XML-based framework for exchanging user, resource, and service provisioning information between cooperating organizations.

A) X.500
B) SPML
C) LDAP
D) OSI
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are some of the characteristics of a strong password?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
37)Describe the main characteristics of a virtual directory.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
35)Briefly described the Clustered ID approach.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
33)What are some other fields or areas that are combined with security technology when providing a security solution?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
38)What are the RFC that define LDAP version 3?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
30)Each LDAP directory entry is a collection of attributes with a unique name called a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Identity
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Password management module
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
OSI
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Role-based modeling
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Identity data layer
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
JNDI
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
IdM system
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
Workflow instance
a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles
LDAP
a set of identifiers associated with an entity
Identity
a set of identifiers associated with an entity
Password management module
a set of identifiers associated with an entity
OSI
a set of identifiers associated with an entity
Role-based modeling
a set of identifiers associated with an entity
Identity data layer
a set of identifiers associated with an entity
JNDI
a set of identifiers associated with an entity
IdM system
a set of identifiers associated with an entity
Workflow instance
a set of identifiers associated with an entity
LDAP
designed to handle any complexity involved in password management under the IDIM model
Identity
designed to handle any complexity involved in password management under the IDIM model
Password management module
designed to handle any complexity involved in password management under the IDIM model
OSI
designed to handle any complexity involved in password management under the IDIM model
Role-based modeling
designed to handle any complexity involved in password management under the IDIM model
Identity data layer
designed to handle any complexity involved in password management under the IDIM model
JNDI
designed to handle any complexity involved in password management under the IDIM model
IdM system
designed to handle any complexity involved in password management under the IDIM model
Workflow instance
designed to handle any complexity involved in password management under the IDIM model
LDAP
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Identity
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Password management module
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
OSI
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Role-based modeling
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Identity data layer
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
JNDI
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
IdM system
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
Workflow instance
an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers
LDAP
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Identity
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Password management module
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
OSI
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Role-based modeling
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Identity data layer
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
JNDI
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
IdM system
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
Workflow instance
integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources
LDAP
a Java API that provides naming and directory functionality to Java applications
Identity
a Java API that provides naming and directory functionality to Java applications
Password management module
a Java API that provides naming and directory functionality to Java applications
OSI
a Java API that provides naming and directory functionality to Java applications
Role-based modeling
a Java API that provides naming and directory functionality to Java applications
Identity data layer
a Java API that provides naming and directory functionality to Java applications
JNDI
a Java API that provides naming and directory functionality to Java applications
IdM system
a Java API that provides naming and directory functionality to Java applications
Workflow instance
a Java API that provides naming and directory functionality to Java applications
LDAP
contains all the data sources from an organization where identity-related information is stored
Identity
contains all the data sources from an organization where identity-related information is stored
Password management module
contains all the data sources from an organization where identity-related information is stored
OSI
contains all the data sources from an organization where identity-related information is stored
Role-based modeling
contains all the data sources from an organization where identity-related information is stored
Identity data layer
contains all the data sources from an organization where identity-related information is stored
JNDI
contains all the data sources from an organization where identity-related information is stored
IdM system
contains all the data sources from an organization where identity-related information is stored
Workflow instance
contains all the data sources from an organization where identity-related information is stored
LDAP
has become the de facto standard of both stand-alone directory and virtual directory technologies
Identity
has become the de facto standard of both stand-alone directory and virtual directory technologies
Password management module
has become the de facto standard of both stand-alone directory and virtual directory technologies
OSI
has become the de facto standard of both stand-alone directory and virtual directory technologies
Role-based modeling
has become the de facto standard of both stand-alone directory and virtual directory technologies
Identity data layer
has become the de facto standard of both stand-alone directory and virtual directory technologies
JNDI
has become the de facto standard of both stand-alone directory and virtual directory technologies
IdM system
has become the de facto standard of both stand-alone directory and virtual directory technologies
Workflow instance
has become the de facto standard of both stand-alone directory and virtual directory technologies
LDAP
a combination of states and transitions that make up a process
Identity
a combination of states and transitions that make up a process
Password management module
a combination of states and transitions that make up a process
OSI
a combination of states and transitions that make up a process
Role-based modeling
a combination of states and transitions that make up a process
Identity data layer
a combination of states and transitions that make up a process
JNDI
a combination of states and transitions that make up a process
IdM system
a combination of states and transitions that make up a process
Workflow instance
a combination of states and transitions that make up a process
LDAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
42)What are the main characteristics of UDDI?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.