Difference between revisions of "Identity Protection Definitions"
Jump to navigation
Jump to search
(Created page with ";Identity Protection :Establishing, growing, preserving and maintaining the integrity, authenticity, reliability and validity of the relationship of an identity to the subject...") |
|||
Line 1: | Line 1: | ||
;Identity Protection | ;Identity Protection | ||
− | :Establishing, growing, preserving and maintaining the integrity, authenticity, reliability and validity of the relationship of an identity to the subject | + | :Establishing, growing, preserving and maintaining the integrity, authenticity, reliability and validity of the relationship of an identity to the subject being identified including activities such as... |
*Anti-phishing - ensuring that all technical connections are identified as originating exclusively from the source of the connection | *Anti-phishing - ensuring that all technical connections are identified as originating exclusively from the source of the connection | ||
*Exclusivity - ensuring that only one entity is the subject of any given identifier. Think of a trademark that can only be used by a single entity. | *Exclusivity - ensuring that only one entity is the subject of any given identifier. Think of a trademark that can only be used by a single entity. |
Revision as of 05:20, 30 August 2022
- Identity Protection
- Establishing, growing, preserving and maintaining the integrity, authenticity, reliability and validity of the relationship of an identity to the subject being identified including activities such as...
- Anti-phishing - ensuring that all technical connections are identified as originating exclusively from the source of the connection
- Exclusivity - ensuring that only one entity is the subject of any given identifier. Think of a trademark that can only be used by a single entity.
- Reputation - ensuring that an identity is known for its established quality without risk of damage
- Awareness - geographically and commercially
- Anti-Theft - protecting against identity theft
- Identity Management
- Operating and using account credentials for purposes related to the identification, authentication and authorisation of individuals and groups including activities such as...
- Authenticating username and passwords
- Multi-Factor Authentication
- Single Sign On
- Password recovery
- User self management
- Identifying authorised services
- Messaging - Welcome and Broadcast
- Security policies (password complexity, lockouts etc)
- Protocol support (SAML2, OpenID Connect, FIDO2, InTune, Extensible SSO)
- Silent Inspection
- Privileged Identity Management
- Account Maintenance
- Provisioning, propagation and maintenance of accounts and groups out of a source of truth (generally the school management system) or multiple sources into dependent systems such as...
- Directories(AD, Azure AD, Cloudwork)
- Learning management systems (Schoolbox, Canvas, Google Classroom etc)
- Curriculum systems (Adobe, Clickview, JSTOR etc)
- Apps (Digistorm, EnrolHQ etc)
- Portals (EnrolHQ, Elcom etc)
- and many more