What's IAM

下面这段话是从Designing an IAM Framework with Oracle Identity and Access Management Suite里面看到了,这段话试图说明IAM不仅仅是把帐号provisioning到某个目标系统中。

A number of years ago, when provisioning was all the rage, suddenly every tiny little company that could stuff you into a single LDAP called themselves a provisioning company. “We provision users to LDAP.” Well, a coffee table wit h a small TV on it is not an entertainment center, and creating a single LDAP obje ct is not provisioning; it’s data entry.

Another poor man’s version of provisioning, still being sold by some vendors, entails mapping a list of resources to a multi-valued attribute within  a user’s profile. When an admin checks a box next to a resource, it adds that resource to that  attribute. This approach assumes that when the time comes, a given application will come to that user’s profile and find out if the user is allowed access. There are some apps that can do thi s, and then there’s the other   99 percent of the world.

And here’s one more, and it probably sounds familiar. It’s  called  provisioning, but it’s really just a lot of calls to the help desk, followed by the opening,  tracking, and closing of a lot of ticketsWhen I hear of this, it’s often accompanied by “we use Lotus for workflow.” Okay, so you’ve automated notifications, but the actual enablement is still all  manual, with no real escalations, no fallbacks, no user tracking, no parallel processing, and certai nly no enforced timetables. A user gets his resources when everybody’s done screwing around.

In simplest form, provisioning can be summarized as two functio ns, workflow and connectorsBut driving a complex, real-world organization requires true en terprise provisioning, which mean intelligent, decision-making user enablement across multiple re sources, based on roles and rules (which in turn are based on security and compliance policies),  rather than simply creating an inventory of resources at the user level. To support these requirements, full-blown provisioning must include:

  •  Role-based access control   ■
  • Request management and tracking   ■
  • Policy-based workflow and approvals   ■
  • Partial to full automation   ■
  • Full compliance   ■
This is where the framework comes in. Ideally, you can launch a new app with the confidence that only authorized users can access it; launch new users with the confidence  that they will receive the right resources (and  only the right resources) to do their jobs; and that the policies which secure both resource and user will keep you in compliance with regulatory and corporate mandates. This is the true enterprise provisioning you can construct with the Oracle suite.

Let me tell you how  not  to provision:

  • Using only a meta-directory. There are solutions out there that rely on this as their primary engine. Meta-directories, such as Oracle Internet Directory (which provides the foundation for some of the largest web sites in the world),  are powerful things. They support  provisioning. But they shouldn’t be provisioning. The way this approach (sort of) works is this: You change the centralized user entry in the meta-directory by updating the attributes that map to rights in back-end applications,  and when the meta-directory synchronizes to those back-end databases, the user has the right flags for access. Wow, that sounds simple. So what’s the problem? No intelligence to drive events such as approvals or notifications, or take into account any dependencies. Limited ability to roll back approvals A and B when C gets rejected. No parallel processing. There are other limitations, but hopefully you get the idea.

  • Giving the job to your help desk or individual admins. I visit far too many customers where provisioning is a strictly manual process. A help desk app is not a provisioning tool. It’s meant to track tickets. There may be manual stops i n a provisioning process where a help desk ticket or notification may be used to prod someone to take a manual step. But you need to have policy-driven workflow, with request  creation and tracking, notifications, escalations, and fallbacks, to ensure timely user enablement and change management.

  • Using the workflow in your collaboration tool. If all you’re doing is    notifications, then you don’t have provisioning; what you’ve done is semi-automate a still very manual process.

下载前必看:https://pan.quark.cn/s/a4b39357ea24 在本资料中,将阐述如何运用JavaScript达成单击下拉列表框选定选项后即时转向对应页面的功能。 此种技术适用于网页布局中用户需迅速选取并转向不同页面的情形,诸如网站导航栏或内容目录等场景。 达成此功能,能够显著改善用户交互体验,精简用户的操作流程。 我们须熟悉HTML里的`<select>`组件,该组件用于构建一个选择列表。 用户可从中选定一项,并可引发一个事件来响应用户的这一选择动作。 在本次实例中,我们借助`onchange`事件监听器来实现当用户在下拉列表框中选定某个选项时,页面能自动转向该选项关联的链接地址。 JavaScript里的`window.location`属性旨在获取或设定浏览器当前载入页面的网址,通过变更该属性的值,能够实现页面的转向。 在本次实例的实现方案里,运用了`eval()`函数来动态执行字符串表达式,这在现代的JavaScript开发实践中通常不被推荐使用,因为它可能诱发安全问题及难以排错的错误。 然而,为了本例的简化展示,我们暂时搁置这一问题,因为在更复杂的实际应用中,可选用其他方法,例如ES6中的模板字符串或其他函数来安全地构建和执行字符串。 具体到本例的代码实现,`MM_jumpMenu`函数负责处理转向逻辑。 它接收三个参数:`targ`、`selObj`和`restore`。 其中`targ`代表要转向的页面,`selObj`是触发事件的下拉列表框对象,`restore`是标志位,用以指示是否需在转向后将下拉列表框的选项恢复至默认的提示项。 函数的实现通过获取`selObj`中当前选定的`selectedIndex`对应的`value`属性值,并将其赋予`...
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值