Identity Management Sample Clauses

Identity Management. Identify management is concerned with controlling information that is used to identify platform users and services for allowing access control permissions to be assigned and evaluated against this identify. The platform provides single sign through one credential for all offered platform services. The platform aims to support OAuth 2.0 offering flexibility for users to be able to use accounts on different providers and to selectively provide access to platform services.
AutoNDA by SimpleDocs
Identity Management. Any accounts created should be role-based, restricting their permissions to the ones needed to fulfil their very purpose. Proposed Roles are: • Auditor (read logs); • Admin (full system); • Operator (function-related files and processes); • System service (liberal system access); • Network service (very restricted system access). Actual user accounts to fill in these roles, however, should only be created when needed. In any case, all of the created accounts must be protected by strong, non-default, state-of-the- art passwords (e.g. following the latest version of the recommendations of the NIST [39]) and be protected against brute force attacks (by rate limiting and/or lockout procedures). Alternatively, they may be protected by public key cryptography (i.e. certificate-based authentication). Remote accounts should also contain a second factor protection (realized via a 2-factor authentication in a VPN system).
Identity Management. Xxxxxxxx’x Identity and Access Management (IdM) system is an integrated infrastructure solution that enables many of Xxxxxxxx’x services and online resources to operate more efficiently, effectively, economically and securely. All new and proposed applications must utilize the authentication and authorization functions and components of the IdM (e.g., Two and Multifactor Authentication, Active Directory Federation Services, etc.). Strong authentication is required for privileged accounts or accounts with access to sensitive information. This technical requirement applies to all solutions, regardless of where the application is hosted.

Related to Identity Management

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Information Management Information and Records

  • Classroom Management The certificated classroom teacher demonstrates in his/her performance a competent level of knowledge and skill in organizing the physical and human elements in the educational setting.

  • SITE MANAGEMENT We reserve the right, but not the obligation, to: (1) monitor the Site for violations of these Terms of Use; (2) take appropriate legal action against anyone who, in our sole discretion, violates the law or these Terms of Use, including without limitation, reporting such user to law enforcement authorities; (3) in our sole discretion and without limitation, refuse, restrict access to, limit the availability of, or disable (to the extent technologically feasible) any of your Contributions or any portion thereof; (4) in our sole discretion and without limitation, notice, or liability, to remove from the Site or otherwise disable all files and content that are excessive in size or are in any way burdensome to our systems; and (5) otherwise manage the Site in a manner designed to protect our rights and property and to facilitate the proper functioning of the Site.

  • Programme Management The Government will establish a programme management office and the Council will be able to access funding support to participate in the reform process. The Government will provide further guidance on the approach to programme support, central and regional support functions and activities and criteria for determining eligibility for funding support. This guidance will also include the specifics of any information required to progress the reform that may be related to asset quality, asset value, costs, and funding arrangements.

  • Time Management Because of the nature of the duties performed by these supervisors, it is impracticable to apply provisions which prescribe normal work hours. However, it is normally expected that eighty (80) hours of work shall constitute a normal payroll period. It is recognized that these supervisors are responsible for managing and accounting for their own hours of work and that they may work hours in excess of the normal work day and/or payroll period and may make adjustments in hours of work in subsequent work days and/or payroll periods, provided such time management system does not result in overtime payment or guarantee hour-for-hour time off for extra hours worked.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Traffic Management The Customer will not utilize the Services in a manner which, in the view of the Centre Operator, significantly distorts traffic balance on the Centre Operator’s circuits which are shared with other users. If, in the reasonable view of the Centre Operator, the Customer’s traffic patterns cause or may cause such distortion, the Customer should have a dedicated circuit capability. If the Customer declines to do so then the Centre Operator may suspend the Services while the matter is being resolved. If there is no resolution within 5 business days then either party may terminate the Agreement.

  • Change Management BellSouth provides a collaborative process for change management of the electronic interfaces through the Change Control Process (CCP). Guidelines for this process are set forth in the CCP document as amended from time to time during this Agreement. The CCP document may be accessed via the Internet at xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx.

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.