Top 239 Identity and Access Management Free Questions to Collect the Right answers

What is involved in Identity and Access Management

Find out what the related areas are that Identity and Access Management connects with, associates with, correlates with or affects, and which require thought, deliberation, analysis, review and discussion. This unique checklist stands out in a sense that it is not per-se designed to give answers, but to engage the reader and lay out a Identity and Access Management thinking-frame.

How far is your company on its Identity and Access Management journey?

Take this short survey to gauge your organization’s progress toward Identity and Access Management leadership. Learn your strongest and weakest areas, and what you can do now to create a strategy that delivers results.

To address the criteria in this checklist for your organization, extensive selected resources are provided for sources of further research and information.

Start the Checklist

Below you will find a quick checklist designed to help you think about which Identity and Access Management related domains to cover and 239 essential critical questions to check off in that domain.

The following domains are covered:

Identity and Access Management, Identity management, Academic journals, Access control, Claims-based identity, Communication protocol, Computer security, Digital card, Digital identity, Digital signature, Directory service, Federated identity, Hardware security module, ISO/IEC JTC1, IT security, Identity-based security, Identity assurance, Identity driven networking, Identity management systems, Identity provider, Identity theft, Information privacy, Information security, Initiative For Open Authentication, International Organization for Standardization, Loyalty card, Mass surveillance, Mobile identity management, Mobile signature, Multi-factor authentication, Mutual authentication, Object identifier, Online identity management, Online social networking, OpenID Connect, Password management, Personal identification number, Personally Identifiable Information, Presence-based services, Privileged identity management, Public key certificate, Role-based access control, SAML-based products and services, SAML 2.0, Security token, Service provider, Seventh Framework Programme, Single sign-on, Smart card, Social web, Software application, Software token, Two-factor authentication, User modeling, Web service, Workflow application:

Identity and Access Management Critical Criteria:

Participate in Identity and Access Management governance and figure out ways to motivate other Identity and Access Management users.

– Do we keep track of who the leading providers of identity management products and services are, and what are their key offerings, differentiators and strategies?

– Can we do forensic investigations of security incidents (for example, who accessed my application yesterday at 2 AM?

– Are the risks associated with the iAm process well understood by management and other relevant individuals?

– Are there any sight distance or physical obstructions that will result in a safety problem?

– Are passwords synchronized among the applications used in the organization?

– Is the access and activity monitored, logged, and reported appropriately?

– What does the organization do with respect to nonperson accounts?

– Why is Identity and Access Management a Strategic Initiative?

– Is the access appropriate for the job being performed?

– Protect virtualization platforms, such as vmware?

– Can it handle your organization in the future?

– How does your organization onboard new hires?

– Do we know the Cost of user access audits?

– What can jsmith123 do on this system?

– Why do we need access management?

– Should groups also have traits?

– Identity chaining and referral?

– Who owns ID X on system Y?

– Who is Responsible for AM?

– Who has what accounts?

Identity management Critical Criteria:

Guard Identity management quality and report on setting up Identity management without losing ground.

– With so many identity management systems proposed, the big question is which one, if any, will provide the identity solution to become standard across the internet?

– What tools do you use once you have decided on a Identity and Access Management strategy and more importantly how do you choose?

– How is the market for identity management evolving in new technologies, market trends and drivers, and user requirements?

– Did we develop our saas identity management solution in house or was it acquired from other vendors?

– To what extent does management recognize Identity and Access Management as a tool to increase the results?

– Complement identity management and help desk solutions with closedloop import and export?

– What are the Key enablers to make this Identity and Access Management move?

– What is the security -life cycle identity management business case?

– What are the identity management facilities of the provider?

– What is a secure identity management infrastructure?

– What is identity management to us (idm)?

– How can identity management help?

– What about identity management?

Academic journals Critical Criteria:

Collaborate on Academic journals goals and find the essential reading for Academic journals researchers.

– Do we monitor the Identity and Access Management decisions made and fine tune them as they evolve?

– Are there Identity and Access Management Models?

Access control Critical Criteria:

Familiarize yourself with Access control issues and report on the economics of relationships managing Access control and constraints.

– Are information security policies, including policies for access control, application and system development, operational, network and physical security, formally documented?

– Can the access control product protect individual devices (e.g., floppy disks, compact disks–read-only memory CD-ROM, serial and parallel interfaces, and system clipboard)?

– If our security management product supports access control based on defined rules, what is the granularity of the rules supported: access control per user, group, or role?

– Does the provider utilize Network Access Control based enforcement for continuous monitoring of its virtual machine population and virtual machine sprawl prevention?

– Access control: Are there appropriate controls over access to PII when stored in the cloud so that only individuals with a need to know will be able to access it?

– Who will be responsible for making the decisions to include or exclude requested changes once Identity and Access Management is underway?

– If data need to be secured through access controls (e.g. password-protected network space), how will they be applied?

– Do access control logs contain successful and unsuccessful login attempts and access to audit logs?

– Is the process actually generating measurable improvement in the state of logical access control?

– Risk factors: what are the characteristics of Identity and Access Management that make it risky?

– Access control: Are there appropriate access controls over PII when it is in the cloud?

– Access Control To Program Source Code: Is access to program source code restricted?

– Should we call it role based rule based access control, or rbrbac?

– Do the provider services offer fine grained access control?

– What type of advanced access control is supported?

– What access control exists to protect the data?

– What is our role based access control?

– Who determines access controls?

Claims-based identity Critical Criteria:

Incorporate Claims-based identity issues and catalog what business benefits will Claims-based identity goals deliver if achieved.

– Are there any easy-to-implement alternatives to Identity and Access Management? Sometimes other solutions are available that do not require the cost implications of a full-blown project?

– How do senior leaders actions reflect a commitment to the organizations Identity and Access Management values?

– How would one define Identity and Access Management leadership?

Communication protocol Critical Criteria:

Huddle over Communication protocol tasks and arbitrate Communication protocol techniques that enhance teamwork and productivity.

– What are our needs in relation to Identity and Access Management skills, labor, equipment, and markets?

– How does the organization define, manage, and improve its Identity and Access Management processes?

Computer security Critical Criteria:

Have a meeting on Computer security adoptions and acquire concise Computer security education.

– Does your company provide end-user training to all employees on Cybersecurity, either as part of general staff training or specifically on the topic of computer security and company policy?

– Will the selection of a particular product limit the future choices of other computer security or operational modifications and improvements?

– Are there Identity and Access Management problems defined?

– Is the scope of Identity and Access Management defined?

– How can we improve Identity and Access Management?

Digital card Critical Criteria:

Interpolate Digital card tactics and suggest using storytelling to create more compelling Digital card projects.

– Does our organization need more Identity and Access Management education?

– How do we keep improving Identity and Access Management?

Digital identity Critical Criteria:

Have a round table over Digital identity decisions and interpret which customers can’t participate in Digital identity because they lack skills.

– How do we ensure that implementations of Identity and Access Management products are done in a way that ensures safety?

– Who are the people involved in developing and implementing Identity and Access Management?

– How will you know that the Identity and Access Management project has been successful?

Digital signature Critical Criteria:

Exchange ideas about Digital signature failures and do something to it.

– Does Identity and Access Management include applications and information with regulatory compliance significance (or other contractual conditions that must be formally complied with) in a new or unique manner for which no approved security requirements, templates or design models exist?

– Are transactions valid? Are digital signatures correct?

– How to deal with Identity and Access Management Changes?

Directory service Critical Criteria:

Grade Directory service adoptions and tour deciding if Directory service progress is made.

– How do you determine the key elements that affect Identity and Access Management workforce satisfaction? how are these elements determined for different workforce groups and segments?

– What are your most important goals for the strategic Identity and Access Management objectives?

– What are specific Identity and Access Management Rules to follow?

Federated identity Critical Criteria:

Meet over Federated identity projects and diversify by understanding risks and leveraging Federated identity.

– Who will be responsible for documenting the Identity and Access Management requirements in detail?

– What are the business goals Identity and Access Management is aiming to achieve?

– Which Identity and Access Management goals are the most important?

Hardware security module Critical Criteria:

Reorganize Hardware security module goals and prioritize challenges of Hardware security module.

– What is our Identity and Access Management Strategy?

ISO/IEC JTC1 Critical Criteria:

Closely inspect ISO/IEC JTC1 goals and gather ISO/IEC JTC1 models .

– What is the purpose of Identity and Access Management in relation to the mission?

– Will Identity and Access Management deliverables need to be tested and, if so, by whom?

– How do we Lead with Identity and Access Management in Mind?

IT security Critical Criteria:

Be responsible for IT security tasks and catalog IT security activities.

– Does the organization need to recover data from computers seized as evidence and to present it to law enforcement for investigative use and to prosecutors for use at trial?

– Has the CIO ensured security training and awareness of all agency employees, including contractors and those employees with significant IT security responsibilities?

– How transparent is the security rules/user account database made to the systems administrator by the security administrative application?

– Would data be prohibitively expensive (in terms of time, money, or other resources) to re-create if lost or damaged?

– Have known product vulnerabilities been addressed by reviewing the relevant vulnerabilities for a product?

– What role does communication play in the success or failure of a Identity and Access Management project?

– Are it security employees in your organization paid more than, less than or equal to other it employees?

– Can our IT Security product adapt to growth and change of the organizations systems infrastructure?

– Are the organization security requirements supported by security plans, policies and procedures?

– Do it security plans exist for all parts of the organization, and are they tested in any format?

– What best describes your organizations priorities for hiring qualified IT security personnel?

– Does your organization have a chief information security officer (CISO or equivalent title)?

– Are users knowledgeable about PKI, and how much training will they undergo?

– How do we choose an it security solution?

– What can be done to mitigate threats?

– What can be done at the client side?

– How are our assets threatened?

– How do we protect ourselves?

– Who has Access?

Identity-based security Critical Criteria:

Unify Identity-based security engagements and optimize Identity-based security leadership as a key to advancement.

– Can we add value to the current Identity and Access Management decision-making process (largely qualitative) by incorporating uncertainty modeling (more quantitative)?

– Which individuals, teams or departments will be involved in Identity and Access Management?

– How can skill-level changes improve Identity and Access Management?

Identity assurance Critical Criteria:

Do a round table on Identity assurance decisions and correct better engagement with Identity assurance results.

– Have the types of risks that may impact Identity and Access Management been identified and analyzed?

– What is our formula for success in Identity and Access Management ?

– How do we go about Securing Identity and Access Management?

Identity driven networking Critical Criteria:

Wrangle Identity driven networking planning and look for lots of ideas.

– Do the Identity and Access Management decisions we make today help people and the planet tomorrow?

– What are internal and external Identity and Access Management relations?

Identity management systems Critical Criteria:

Survey Identity management systems governance and forecast involvement of future Identity management systems projects in development.

– Which customers cant participate in our Identity and Access Management domain because they lack skills, wealth, or convenient access to existing solutions?

– How do we make it meaningful in connecting Identity and Access Management with what users do day-to-day?

Identity provider Critical Criteria:

Coach on Identity provider issues and probe Identity provider strategic alliances.

– Do we cover the five essential competencies-Communication, Collaboration,Innovation, Adaptability, and Leadership that improve an organizations ability to leverage the new Identity and Access Management in a volatile global economy?

– In what ways are Identity and Access Management vendors and us interacting to ensure safe and effective use?

– What business benefits will Identity and Access Management goals deliver if achieved?

– What aggregated single sign on sso identity provider do we use and why?

Identity theft Critical Criteria:

Examine Identity theft tactics and devise Identity theft key steps.

– what is the best design framework for Identity and Access Management organization now that, in a post industrial-age if the top-down, command and control model is no longer relevant?

– Identity theft could also be an inside job. Employees at big companies that host e-mail services have physical access to e-mail accounts. How do you know nobodys reading it?

– What are your key performance measures or indicators and in-process measures for the control and improvement of your Identity and Access Management processes?

– Are we making progress? and are we making progress as Identity and Access Management leaders?

Information privacy Critical Criteria:

Debate over Information privacy decisions and observe effective Information privacy.

– Who needs to know about Identity and Access Management ?

Information security Critical Criteria:

Systematize Information security outcomes and probe using an integrated framework to make sure Information security is getting what it needs.

– Has the organization established an Identity and Access Management program that is consistent with requirements, policy, and applicable guidelines and which identifies users and network devices?

– Do we maintain our own threat catalogue on the corporate intranet to remind employees of the wide range of issues of concern to Information Security and the business?

– Are information security policies and other relevant security information disseminated to all system users (including vendors, contractors, and business partners)?

– Does the ISMS policy provide a framework for setting objectives and establishes an overall sense of direction and principles for action with regard to information security?

– Does this review include assessing opportunities for improvement, need for changes to the ISMS, review of information security policy & objectives?

– Does your company have a current information security policy that has been approved by executive management?

– Have standards for information security across all entities been established or codified into law?

– Is there a consistent and effective approach applied to the mgmt of information security events?

– Is an organizational information security policy established?

– Are damage assessment and disaster recovery plans in place?

– Is information security an it function within the company?

– How to achieve a satisfied level of information security?

– Does your company have an information security officer?

– Conform to the identified information security requirements?

– What are our Identity and Access Management Processes?

Initiative For Open Authentication Critical Criteria:

Nurse Initiative For Open Authentication strategies and give examples utilizing a core of simple Initiative For Open Authentication skills.

– Is the Identity and Access Management organization completing tasks effectively and efficiently?

– Are accountability and ownership for Identity and Access Management clearly defined?

– Are we Assessing Identity and Access Management and Risk?

International Organization for Standardization Critical Criteria:

Cut a stake in International Organization for Standardization management and attract International Organization for Standardization skills.

Loyalty card Critical Criteria:

Reason over Loyalty card results and cater for concise Loyalty card education.

– How do you incorporate cycle time, productivity, cost control, and other efficiency and effectiveness factors into these Identity and Access Management processes?

– What is the source of the strategies for Identity and Access Management strengthening and reform?

– What are all of our Identity and Access Management domains and what do they do?

Mass surveillance Critical Criteria:

Be clear about Mass surveillance quality and adjust implementation of Mass surveillance.

– Why is Identity and Access Management important for you now?

Mobile identity management Critical Criteria:

Probe Mobile identity management strategies and perfect Mobile identity management conflict management.

– What sources do you use to gather information for a Identity and Access Management study?

– Do we all define Identity and Access Management in the same way?

– What is Effective Identity and Access Management?

Mobile signature Critical Criteria:

Reorganize Mobile signature outcomes and optimize Mobile signature leadership as a key to advancement.

– What may be the consequences for the performance of an organization if all stakeholders are not consulted regarding Identity and Access Management?

– Who is the main stakeholder, with ultimate responsibility for driving Identity and Access Management forward?

Multi-factor authentication Critical Criteria:

Grade Multi-factor authentication adoptions and arbitrate Multi-factor authentication techniques that enhance teamwork and productivity.

– Does remote server administration require multi-factor authentication of administrative users for systems and databases?

– How can you negotiate Identity and Access Management successfully with a stubborn boss, an irate client, or a deceitful coworker?

– Is multi-factor authentication supported for provider services?

Mutual authentication Critical Criteria:

Grasp Mutual authentication goals and adopt an insight outlook.

– A compounding model resolution with available relevant data can often provide insight towards a solution methodology; which Identity and Access Management models, tools and techniques are necessary?

– In a project to restructure Identity and Access Management outcomes, which stakeholders would you involve?

– How is the value delivered by Identity and Access Management being measured?

Object identifier Critical Criteria:

Test Object identifier visions and shift your focus.

– Are the data and associated software produced and/or used in the project discoverable (and readily located), identifiable by means of a standard identification mechanism (e.g. digital object identifier)?

– How do your measurements capture actionable Identity and Access Management information for use in exceeding your customers expectations and securing your customers engagement?

– How do we go about Comparing Identity and Access Management approaches/solutions?

Online identity management Critical Criteria:

Focus on Online identity management results and attract Online identity management skills.

– Do Identity and Access Management rules make a reasonable demand on a users capabilities?

Online social networking Critical Criteria:

Audit Online social networking engagements and interpret which customers can’t participate in Online social networking because they lack skills.

– How important is Identity and Access Management to the user organizations mission?

OpenID Connect Critical Criteria:

Unify OpenID Connect leadership and observe effective OpenID Connect.

– Why is it important to have senior management support for a Identity and Access Management project?

– Is Identity and Access Management dependent on the successful delivery of a current project?

– What about Identity and Access Management Analysis of results?

Password management Critical Criteria:

Derive from Password management risks and interpret which customers can’t participate in Password management because they lack skills.

– Do we aggressively reward and promote the people who have the biggest impact on creating excellent Identity and Access Management services/products?

– Are documented procedures in place for user and password management and are they monitored for compliance?

– What will drive Identity and Access Management change?

Personal identification number Critical Criteria:

Have a session on Personal identification number issues and do something to it.

– What other organizational variables, such as reward systems or communication systems, affect the performance of this Identity and Access Management process?

– Does Identity and Access Management analysis isolate the fundamental causes of problems?

– How much does Identity and Access Management help?

Personally Identifiable Information Critical Criteria:

Add value to Personally Identifiable Information leadership and maintain Personally Identifiable Information for success.

– When sharing data, are appropriate procedures, such as sharing agreements, put in place to ensure that any Personally identifiable information remains strictly confidential and protected from unauthorized disclosure?

– Does the company collect personally identifiable information electronically?

– What is Personal Data or Personally Identifiable Information (PII)?

– How can you measure Identity and Access Management in a systematic way?

Presence-based services Critical Criteria:

Read up on Presence-based services engagements and attract Presence-based services skills.

– What is the total cost related to deploying Identity and Access Management, including any consulting or professional services?

Privileged identity management Critical Criteria:

Track Privileged identity management visions and sort Privileged identity management activities.

– How likely is the current Identity and Access Management plan to come in on schedule or on budget?

– Who will provide the final approval of Identity and Access Management deliverables?

– Is Supporting Identity and Access Management documentation required?

Public key certificate Critical Criteria:

Map Public key certificate risks and plan concise Public key certificate education.

– Think about the functions involved in your Identity and Access Management project. what processes flow from these functions?

– Is Identity and Access Management Realistic, or are you setting yourself up for failure?

– Who sets the Identity and Access Management standards?

Role-based access control Critical Criteria:

Depict Role-based access control failures and forecast involvement of future Role-based access control projects in development.

– What are the Essentials of Internal Identity and Access Management Management?

SAML-based products and services Critical Criteria:

Systematize SAML-based products and services adoptions and do something to it.

– How do we Improve Identity and Access Management service perception, and satisfaction?

SAML 2.0 Critical Criteria:

Study SAML 2.0 outcomes and develop and take control of the SAML 2.0 initiative.

– What are your current levels and trends in key measures or indicators of Identity and Access Management product and process performance that are important to and directly serve your customers? how do these results compare with the performance of your competitors and other organizations with similar offerings?

– Do those selected for the Identity and Access Management team have a good general understanding of what Identity and Access Management is all about?

Security token Critical Criteria:

Categorize Security token issues and visualize why should people listen to you regarding Security token.

– Think about the people you identified for your Identity and Access Management project and the project responsibilities you would assign to them. what kind of training do you think they would need to perform these responsibilities effectively?

– What are the usability implications of Identity and Access Management actions?

– How to Secure Identity and Access Management?

Service provider Critical Criteria:

Consult on Service provider failures and plan concise Service provider education.

– During the last 3 years, have you been the subject of an investigation or action by any regulatory or administrative agency for privacy related violations?

– Think about service providers who have difficulty making small talk during interactions with customers. why do you think this happens?

– Can the cloud service provider offer the flexibility to provide availability service levels in line with the customers requirements?

– Do you monitor your network in real time to detect possible intrusions or abnormalities in the performance of your system?

– Are systems regularly audited to identify inappropriate code and/or applications that have been installed?

– If not technically feasible, what safeguards are in place to ensure the security of private information?

– Recoverability: how will the service provider respond to disasters and ensure continued service?

– Are user accounts audited regularly to determine their security levels are appropriately set?

– Documentation Logs What records should be kept from before, during, and after an incident?

– Do you provide opt-out controls that are visible and addressed within the privacy policy?

– What percentage of revenues is generated from services provided by sub-contractors?

– Does the cloud service provider require third-party providers in order to deliver services?

– Do you monitor log files on a regular basis to help spot abnormal trends?

– Do you have a formal procedure in place for handling customer complaints?

– Is the cloud service providers service desk local, onshore or offshore?

– What is the it security environment of the service provider?

– Are there any industry based standards that you follow?

– Are contingencies and disasters covered?

– Do we have an Arbitration Clause?

– Security Considerations -What?

Seventh Framework Programme Critical Criteria:

Examine Seventh Framework Programme strategies and pioneer acquisition of Seventh Framework Programme systems.

– Is there any existing Identity and Access Management governance structure?

Single sign-on Critical Criteria:

Deliberate Single sign-on adoptions and find out what it really means.

– How can I avoid duplication of identity, attributes, and credentials and provide a single sign-on user experience for my users?

– What potential environmental factors impact the Identity and Access Management effort?

Smart card Critical Criteria:

Mix Smart card projects and get going.

– How do we manage Identity and Access Management Knowledge Management (KM)?

Social web Critical Criteria:

Frame Social web governance and use obstacles to break out of ruts.

– What knowledge, skills and characteristics mark a good Identity and Access Management project manager?

– Is the social web being irreversibly corrupted by automation tools?

Software application Critical Criteria:

Investigate Software application leadership and don’t overlook the obvious.

– what is the BI software application landscape going to look like in the next 5 years?

– How do we Identify specific Identity and Access Management investment and emerging trends?

– Does Identity and Access Management appropriately measure and monitor risk?

Software token Critical Criteria:

Generalize Software token tasks and visualize why should people listen to you regarding Software token.

– Who will be responsible for deciding whether Identity and Access Management goes ahead or not after the initial investigations?

– Is there a Identity and Access Management Communication plan covering who needs to get what information when?

– What threat is Identity and Access Management addressing?

Two-factor authentication Critical Criteria:

Administer Two-factor authentication strategies and track iterative Two-factor authentication results.

– Think of your Identity and Access Management project. what are the main functions?

User modeling Critical Criteria:

Add value to User modeling failures and clarify ways to gain access to competitive User modeling services.

– What are the long-term Identity and Access Management goals?

Web service Critical Criteria:

Add value to Web service goals and learn.

– Expose its policy engine via web services for use by third-party systems (e.g. provisioning, help desk solutions)?

– How does this standard provide users the ability to access applications and services through web services?

– What is the best strategy going forward for data center disaster recovery?

– Amazon web services is which type of cloud computing distribution model?

Workflow application Critical Criteria:

Participate in Workflow application strategies and correct Workflow application management by competencies.

– What other jobs or tasks affect the performance of the steps in the Identity and Access Management process?


This quick readiness checklist is a selected resource to help you move forward. Learn more about how to achieve comprehensive insights with the Identity and Access Management Self Assessment:

Author: Gerard Blokdijk

CEO at The Art of Service |

Gerard is the CEO at The Art of Service. He has been providing information technology insights, talks, tools and products to organizations in a wide range of industries for over 25 years. Gerard is a widely recognized and respected information expert. Gerard founded The Art of Service consulting business in 2000. Gerard has authored numerous published books to date.

External links:

To address the criteria in this checklist, these selected resources are provided for sources of further research and information:

Identity and Access Management External links:

[PDF]Identity and Access Management Overview

Identity and Access Management Solutions | One Identity

Identity management External links:

ALSDE Identity Management (AIM) « ALSDE (Alabama …

ISG – Identity Management System – Login

Colorado Department of Education Identity Management

Academic journals External links:

Peer Review Academic journals | Journal Issues

Academic Journals

Access control External links:

Multi-Factor Authentication – Access control | Microsoft Azure

Linear Pro Access – Professional Access Control Systems

What is Access Control? – Definition from Techopedia

Claims-based identity External links:

A Guide to Claims-Based Identity and Access Control …

Communication protocol External links:


“Communication Protocol Design Considerations For …

Communication protocol modeling (Book, 1981) …

Computer security External links:

Avast Store | All Computer Security Products & Services

Naked Security – Computer Security News, Advice and …

Report a Computer Security Vulnerability – TechNet …

Digital card External links: : Targus USB 2.0 Secure Digital Card Reader/Writer with Micro SD Slot (TGR-MSD500) : Computer Memory Card Readers : Camera & Photo

Print Your Digital Card Layouts | Shutterfly

Spellweaver – Online Digital Card Game

Digital identity External links:

Element: Delivering digital identity

OT-Morpho | Leader in Biometrics and Digital Identity

Digital Identity Summit 2018: The Power to Predict

Digital signature External links:

Digital Signature Request Form – United States Army

How to Add a Digital Signature into PDF Document

Digital Signature Services | SIGNiX

Directory service External links:

Directory Service FAQs – Amazon Web Services (AWS)

URI Directory Service

Federated identity External links:

Federated identity primer (Book, 2013) []

Federated Identity for Web Applications –

[PDF]Federated Identity Management – UAH – Computer …

Hardware security module External links:

Atalla Hardware Security Module (HSM) | Voltage

Excrypt SSP9000 Hardware Security Module (HSM) | …

ISO/IEC JTC1 External links:

ISO/IEC JTC1/SC22/WG20 N873 – Unicode Consortium

[PDF]ISO/IEC JTC1/SC22/WG21 N4544 –

ISO/IEC JTC1/SC22/WG20 N873 . Title: ISO/IEC JTC1/SC22/WG20 resolutions, Malvern meeting 2001-10-01/03 . Source: ISO/IEC JTC1/SC22/WG20
http://[PDF]ISO/IEC JTC1/SC22/WG21 N4544 –

IT security External links:

IT Security | LBMC Information Security

Identity-based security External links:

CJIS Compliance: Identity-Based Security Solutions for …

[PDF]Identity-Based Security Highlights: Benefits

Identity-Based Security Solutions | Safeguard Enterprises

Identity assurance External links:

Identity Assurance

Robot Identity Assurance – EBSCO Information Services

Identity management systems External links:

Comprehensive Study of Identity Management Systems

Identity Management Systems Program | NIST

[PDF]Federated Identity Management Systems – Cornell …

Identity provider External links:

Waiting for Identity Provider

Identity Providers – Developer Documentation | Janrain

Clareity – Identity Provider Error

Identity theft External links:

[PDF]Form 14039 Identity Theft Affidavit

[PDF]Identity Theft and Your Social Security Number

Information privacy External links:

Health Information Privacy |

Information Privacy | Citizens Bank

Information Privacy Policy | DuPont Sustainable Solutions

Information security External links:

ALTA – Information Security



Initiative For Open Authentication External links:

Initiative For Open Authentication –

About: Initiative For Open Authentication – DBpedia

International Organization for Standardization External links:

MDMC – International Organization for Standardization (ISO)

ISO International Organization for Standardization

ISO – International Organization for Standardization

Loyalty card External links:

Loyalty Card – Welcome to Mr. Gas

Loyalty Card Program – Acme Oyster House

Loyalty Card – Bigfoot Java

Mass surveillance External links:

Fight 215: Stop the Patriot Act’s Mass Surveillance

Mobile identity management External links:

Mobile Identity Management — ENISA IDM

Mobile signature External links:

Joel’s Mobile Signature Detailing Service | Tucson Arizona

nintex mobile signature field | Nintex Community

iSign – IBM i native Mobile Signature Capture

Multi-factor authentication External links:

Multi-Factor Authentication™ | User Portal

Multi-Factor Authentication – Access control | Microsoft Azure

Multi-Factor Authentication™ | User Portal

Mutual authentication External links:

Mutual Authentication Established by Subject Alternative …

Object identifier External links:

unique object identifier in javascript – Stack Overflow

APA Style Blog: Digital Object Identifier (DOI)

LibGuides: DOI (Digital Object Identifier): Citation Examples

Online identity management External links:

Online Identity Management | NCEdCloud IAM Service

Online social networking External links:

Schools and Online Social Networking | Education World

OpenID Connect External links:

OpenID Connect Flows – Scott Brady

OpenID Connect | Google Identity Platform | Google Developers

OpenID Connect Client Request for Authorization

Password management External links:

SLU Net ID Password Management

Self Service Reset Password Management

Password Management Framework 3.1.a

Personal identification number External links:

FAQ – Personal Identification Number –

How do I get my Personal Identification Number (PIN)?

Personally Identifiable Information External links:

Personally Identifiable Information (PII) – RMDA

Examples of Personally Identifiable Information (PII)

Personally Identifiable Information (PII) – RMDA

Privileged identity management External links:

Privileged Identity Management – Liebsoft

Public key certificate External links:

What is public key certificate? – Definition from

Haad Dataflow Guide | Public Key Certificate | Nursing

Public Key Certificate-Based Authentication

Role-based access control External links:

Role-Based Access Control. (eBook, 2007) []

[PDF]Role-Based Access Control Models – Computer – Ravi …

SAML-based products and services External links:

SAML-based products and services explained

SAML 2.0 External links:

Use a SAML 2.0 identity provider to implement single sign …

SAML 2.0 Auto-POST form – HealthPartners

Security token External links:

BB&T – Request a Security Token

Login to the security token service (STS)

[PDF]Security Token User Guide – PDF – Opus Bank

Service provider External links:

My Provider Link – Your Service Provider’s Billing Partner

Sonic – Internet & Phone Service Provider

Seventh Framework Programme External links:


Single sign-on External links:

Single Sign-On | HVCC

UAH Single Sign-On – CAS – Central Authentication Service

JCCC Single Sign-on

Smart card External links:

Smart Cards | Coupons and Virtual Smart Card

Social web External links:

On social Web, folks take the #IceBucketChallenge – CNN

[PDF]Mining the Social Web

Social web safety tips for teens |

Software application External links:

Help You Sponsor – Child Sponsorship Software Application

Software token External links:

Software Token Activation Procedure – Square Enix

RSA SecurID Software Token FAQ’s – UPS’s.htm

RSA SecurID Software Token – Android Apps on Google Play

Two-factor authentication External links:

Using Two-Factor Authentication with Shibboleth | …

Two-factor authentication (eBook, 2015) []

Two-Factor Authentication with TPAM (89606) – One …

User modeling External links:

User Modeling – Home | Facebook

THUM 2017: Temporal and Holistic User Modeling | …

Web service External links:

Free BIN/IIN Lookup Web Service –

Tax Data Systems – Sales Tax Rates Web Service

Yoder Heritage Day | | Yoder Web Service

Workflow application External links:

NAVSEA Conducts Shipboard, Shore-based Workflow Application

PNC Workflow Application

QNOPY Environmental Field Data and Workflow Application