Identity and Access Management Sample Clauses

Identity and Access Management. Identity and Access Management are Services available via their respective MindSphere APIs. These Services are used to manage users, customers/subtenants, roles and scopes. A tenant is a representation of a real-world organization. It covers properties such as users, data, assets, entities and others. A subtenant is a certain limited resource of a tenant representing a subpart of your own real-world organization. In a MindAccess Developer Plan, a subtenant can also represent the real-world organization of a third party that you permit to test Applications for such third partiesend use. A subtenant is also used to assign Applications and provide access to Applications.
AutoNDA by SimpleDocs
Identity and Access Management. The Solution shall provide capabilities such as user authentication, password policy management, two factor authentication, single sign on, and role-based access.
Identity and Access Management. Management of accounts, including accounts with privileged access, must prevent unauthorized access and mitigate the impacts thereof.
Identity and Access Management. The Accessing Party will permit access to the other party’s Confidential Information, and, if applicable, its Systems, solely on a need-to-know basis, and the Accessing Party will review such access on an ongoing basis. The Accessing Party will implement identity and access management of all account credentials including but not limited to: segregated accounts and credentials for each unique user, strict management of administrative accounts, and password best practices, strong passwords, removal of default passwords, and secure password storage. The Accessing Party will remove access of all Personnel who no longer require access to the other party’s Systems in accordance with the Accessing Party’s policies including immediate termination on involuntary separation.
Identity and Access Management. Access to Subscriber Personal Data is granted under the principle of least privilege. Only authorized Personnel have access to Subscriber Personal Data. Sprout Social restricts access to the production environments to designated Sprout Social employees based on documented permissions as defined in a role-based user access matrix.
Identity and Access Management. Vendor shall provide authentication and access control mechanisms. Vendor shall utilize tools that are available to provide authentication information.
Identity and Access Management. Provider implements access standards designed to authenticate users, permit authorized access to Data, maintain segregation of duties, and revoke access as part of employee termination or transition.
AutoNDA by SimpleDocs
Identity and Access Management x. Xxxxx personnel are assigned unique usernames and are required to use strong passwords for access to Pendo’s systems. Shared accounts are not allowed unless required for specific use cases that have been authorized by the CISO. b. Wherever technically feasible, two-factor authentication is used to access Pendo’s system and applications. c. System access rights are granted or modified on a business-need basis depending on the user's job role and/or specific management request. x. Xxxxx performs reviews of privileged and regular user access to production critical systems on a quarterly basis to determine access appropriateness. e. Access controls are in place to restrict access to modify production data, other than routine transaction processing.
Identity and Access Management. Each Party shall have suitable identification and authentication controls for information systems that process classified information subject to this Memorandum of Understanding.
Identity and Access Management. DSHS will authorize, and will issue, any necessary information access mechanisms, including access identities (IDs) and passwords, and the Contractor agrees that the personnel to whom they are issued will use the same mechanisms. The Contractor will provide these personnel only with the minimum level of access necessary to perform the tasks and functions for which they are responsible. The Contractor will provide DSHS with an updated list of those Contractor personnel who have access to DSHS's and/or it’s Affiliates' systems, software and data, and the level of such access. The Contractor will provide this list at the request of DSHS or at least quarterly in the absence of any request from DSHS.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!