What's IAM

下面这段话是从Designing an IAM Framework with Oracle Identity and Access Management Suite里面看到了,这段话试图说明IAM不仅仅是把帐号provisioning到某个目标系统中。

A number of years ago, when provisioning was all the rage, suddenly every tiny little company that could stuff you into a single LDAP called themselves a provisioning company. “We provision users to LDAP.” Well, a coffee table wit h a small TV on it is not an entertainment center, and creating a single LDAP obje ct is not provisioning; it’s data entry.

Another poor man’s version of provisioning, still being sold by some vendors, entails mapping a list of resources to a multi-valued attribute within  a user’s profile. When an admin checks a box next to a resource, it adds that resource to that  attribute. This approach assumes that when the time comes, a given application will come to that user’s profile and find out if the user is allowed access. There are some apps that can do thi s, and then there’s the other   99 percent of the world.

And here’s one more, and it probably sounds familiar. It’s  called  provisioning, but it’s really just a lot of calls to the help desk, followed by the opening,  tracking, and closing of a lot of ticketsWhen I hear of this, it’s often accompanied by “we use Lotus for workflow.” Okay, so you’ve automated notifications, but the actual enablement is still all  manual, with no real escalations, no fallbacks, no user tracking, no parallel processing, and certai nly no enforced timetables. A user gets his resources when everybody’s done screwing around.

In simplest form, provisioning can be summarized as two functio ns, workflow and connectorsBut driving a complex, real-world organization requires true en terprise provisioning, which mean intelligent, decision-making user enablement across multiple re sources, based on roles and rules (which in turn are based on security and compliance policies),  rather than simply creating an inventory of resources at the user level. To support these requirements, full-blown provisioning must include:

  •  Role-based access control   ■
  • Request management and tracking   ■
  • Policy-based workflow and approvals   ■
  • Partial to full automation   ■
  • Full compliance   ■
This is where the framework comes in. Ideally, you can launch a new app with the confidence that only authorized users can access it; launch new users with the confidence  that they will receive the right resources (and  only the right resources) to do their jobs; and that the policies which secure both resource and user will keep you in compliance with regulatory and corporate mandates. This is the true enterprise provisioning you can construct with the Oracle suite.

Let me tell you how  not  to provision:

  • Using only a meta-directory. There are solutions out there that rely on this as their primary engine. Meta-directories, such as Oracle Internet Directory (which provides the foundation for some of the largest web sites in the world),  are powerful things. They support  provisioning. But they shouldn’t be provisioning. The way this approach (sort of) works is this: You change the centralized user entry in the meta-directory by updating the attributes that map to rights in back-end applications,  and when the meta-directory synchronizes to those back-end databases, the user has the right flags for access. Wow, that sounds simple. So what’s the problem? No intelligence to drive events such as approvals or notifications, or take into account any dependencies. Limited ability to roll back approvals A and B when C gets rejected. No parallel processing. There are other limitations, but hopefully you get the idea.

  • Giving the job to your help desk or individual admins. I visit far too many customers where provisioning is a strictly manual process. A help desk app is not a provisioning tool. It’s meant to track tickets. There may be manual stops i n a provisioning process where a help desk ticket or notification may be used to prod someone to take a manual step. But you need to have policy-driven workflow, with request  creation and tracking, notifications, escalations, and fallbacks, to ensure timely user enablement and change management.

  • Using the workflow in your collaboration tool. If all you’re doing is    notifications, then you don’t have provisioning; what you’ve done is semi-automate a still very manual process.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
社会的进步导致人们对于学习的追求永不止境,那么追求农业信息化的方式也从单一的田地教程变成了多样化的学习方式。多样化的学习方式不仅仅是需要人们智慧的依靠,还需要能够通过软件的加持进行信息化的价值体现。软件和系统的产生,从表面上来看是方便了某一行业和某一行业的用户,其实是从本质上来说是提高了社会的进步。就拿我们常见的出行而言,滴滴出行看似是为了打车和出行的人方便,但其实通过另外一种程度上来说,可以通过软件应用的调度和发展来为社会、城市出行的发展做出巨大的贡献。我们国家从最早的中国制造业演变到现在的“智造”,就是因为有软件信息系统的价值,能够将一些智慧的因素加入到制造的过程当中,而这一点就是软件系统来改变生产和现实的需求。在计算机时代日益发展的今天,计算机网络正快速融入这个社会的每一个领域。农业的发展是社会当中一种必有可少的方式。果树在种植和培养是直接影响果农及果商的发展,但在果树的资源管理方面还是有着很大的不同,所以信息多样化的果树管理方式很重要。在传统的果树资源管理上还有着很大的约束,为此开发和设计JSP杏种质资源管理系统,该系统内容丰富多彩,用户可以在线进行果杏树的资源查询等。本文还是使用JSP的方式来进行管理的,但在系统建设过程当中也考虑了许许多多信息安全的保护。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值