With regard to Identity the end user must prove that he is who he says he is. The most common mechanism is by being able to remember a username and password combination. Other mechanism (forms authentication) is the combination of 'remembering something' with having something physical. For example, a key card, mobile phone, token, fingerprint, etc. The latter are often called strong forms of authentication or two-factor Authentication.
In addition to the authentication, authorization plays a strong role in Identity and Access Management. The authorization determines which items (resources) a user can access in the network. These resources include: systems, applications, printers, shares, etc. Where the authentication is fairly simple, the authorization is often a complex set of rules. Depending on the position that a person has in an organization the access privileges vary on the network.
Identity and Access Management Software
The authentication and authorization . of a user in the network is the core of Identity & Access Management. Identity and Access Management software includes the functionality to the entire process around the management of authentication and authorization of the user to streamline. This functionality is of administration, among other things:
- Auto User Provisioning
- Workflow Management and Self-Service
- Password Management
- Single Sign-On (SSO)
- Role Based Acces Control / Access Governance
- Audit & Compliance
Identity Governance & Administration (IGA)
Gradually the term Identity and Access Management is replaced by Identity Governance & Administration (IGA). Gartner uses this new term for IAM solutions that offer both identity and access governance (IAG) as well as user administration and provisioning to manage identity and access life cycles across multiple systems.
School Districts in California that use Tools4Ever*
|Menifee Union Elementary|
|Mountain View Elementary|
|Pajaro Valley Unified|
|San Dieguito Union High|
|Ventura County Office of Education|
* This is a partial list generated through our annual technology systems survey, internet searches, and other methods.
Also, districts constantly change enterprise systems in an never ending quest to find the 'best' of the best. So expect these results to change over time.
If your district currently uses this system but doesn't appear on this list, please let us know by updating your district's info on our annual systems survey: