Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Each IT system or application has the concept of a user or “user account” object. The user account is what is used to control permissions within the application and for authentication. In EmpowerID, the user account object is known as the Person and is stored in the Person table. Anyone authenticating to use the EmpowerID application must have a Person object. All activities are centered around this Person object. For example: assigning roles, granting access, recertifying access, assessing risk, and reporting. Employees, partners, and customers can authenticate and use the EmpowerID applications with only a Person object even if they do not have any other user accounts.

As an Identity Management platform, one of EmpowerID’s primary use cases is to present an accurate picture of the security within each IT system in an organization's on-premise and Cloud landscape. In order to do this, EmpowerID periodically inventories and pulls in the user account objects from these “external” or “managed” systems into the Account table. From here on out we'll refer to them simply as Accounts in order to avoid confusion. Accounts are users from external systems and Person objects are the primary identity or user object for the EmpowerID system.

We mentioned above that a key use case is to present an accurate picture of the access assigned to Accounts across an organization’s IT systems and if it is compliant with risk policies. What makes access “compliant”? Compliant access is appropriate to the person to whom it is assigned in compliance with the organizational standards and business policies to minimize risk. The key here is that the appropriateness of access

Compliant Access Delivery synthesizes multiple Identity and Access Management (IAM) technologies with a business modeling approach to automate and maintain each user with their appropriate Access to IT systems while continuously minimizing risk.

  • Core Identity – single entity per human or IoT​

  • Person — core identity can be the owner of other person objects ​

  • OrgRoIe — Business Role always assigned in conjunction with an Organizational Location ​

  • OrgZone — Organizational Location / Business Context always assigned in conjunction with a Business Role ​

  • Polyarchical RBAC — Business Roles and Locations are both hierarchical trees. People are assigned to one or more Business Roles each for a specific Location/Context. This polyarchy dramatically reduces the number of roles and eliminates role bloat ​

  • Company — people belong to companies via their Business Role and Location assignments ​

  • Personas — person core identity can be linked to multiple sub-person objects which are the ​professional identities — i.e. have the business ​information attached​

...