Results for: id Search Results
Family Filter:
SOUND ID is the innovator of the Bluetooth headset and Bluetooth earpiece including hands free headsets for blackberry, mobile, Skype, iphone and all types of Bluetooth headsets & accessories.
4:08
Content: • Command-line execution of FTP client. • Plaintext password replaced with credentials from secure vault. • Video shows establishment of trust relationship. Key concepts: • Authentication into Privileged Access Manager web services API uses OTP and IP address validation. • Wrapper library manages caching, encryption, key generation, serialization. • Encryption key generated based on runtime environment. • Command-line launcher hides complexity from user.
20 Jun 2018
2
Share Video

0:39
Content: • An employee logs into Hitachi ID Identity Manager and updates his own contact information. • The request is automatically approved. Key concepts: • Routine changes, for example to personal contact information, can be moved from a help desk call to a self-service model. • Access controls determine who can see and who can modify what in whose profile. In this case, self-service update of contact information is allowed. • Security policy also determines what authorization is required before a change request is completed. In this case, none.
31 May 2018
14
Share Video

1:05
Content: • Application owner reviews a list of users with access to his application as well as their entitlements (groups) within that application. Key concepts: • Review of application access by application owner. • Review includes fine-grained entitlements. • Organize data by user or by login ID/group.
31 May 2018
11
Share Video

0:31
Content: • A user has been invited to fill in a form with login IDs and passwords. • This animation starts after the user has been invited and has authenticated. • Multiple authentication steps - security questions, login IDs, biometrics, etc. are normally integrated into a single process. Key concepts: • This process eliminates the need to "match" profile data on different systems (can be costly, unreliable). • Users don't need to know what a system is "officially" called, eliminating a common cause of misunderstanding between users and IT staff. • Users must "prove possession" by providing a correct password, making this process totally secure.
31 May 2018
19
Share Video

2:40
with this easy method you will be able to create by yourself passport id size using an android device
2 Jun 2018
25
Share Video

0:52
At Advantage Chiropractic's Clinics are dedicated to helping you achieve your wellness objectives -- Advantage Walk-In Chiropractic is one of the few Boise chiropractic clinics that offer two locations combining skill and expertise that spans the entire chiropractic wellness spectrum. Advantage Walk in Chiropractic is not just another Boise back pain clinic, the Doctors and the staff have a genuine concern for your well-being! Address:- 3211 N. Milwaukee St., Boise, ID 83704 Phone:- 208-375-2225
16 Jun 2018
2
Share Video

1:29
Content: • This video shows how a manager can request access for a new contractor using a self-service form. Key concepts: • While employees are normally auto-provisioned based on an HR feed, contractors typically are not. • Validation of the request form and routing to authorizers for approval happens next (separate recordings).
31 May 2018
11
Share Video

4:52
Content: • A new employee is added to an HR application. • A batch process is triggered manually (just for demos -- normally it is scheduled). • Accounts for the new user are automatically created on AD and elsewhere. Key concepts: • Automation is typically a batch process that runs at least once daily. • Business logic determines what to do when user records are added to, removed from or changed on each system of record. • Most suitable for coarse-grained (i.e., hire/fire) changes detected on HR systems. • Can also automate synchronization of identity attributes between systems.
31 May 2018
20
Share Video

2:56
Content: • A newly hired contractor signs in by answering security questions based on PII data (driver's license, mother's maiden name, date of birth, etc.). • A random PIN may also be sent to the user's phone or personal e-mail address. • Once authenticated, the user must complete a profile of security questions / answers. • The user resets his own password -- there was never a known, shared password value. • The user may be asked to review and accept policy documents at first login. Key concepts: • Eliminate the need for predictable initial password. • Capture security questions at first login. • Get new users to read and accept policy documents.
31 May 2018
21
Share Video

0:30
Content: • Approval of a change to a user's scheduled termination date is handled by an HR user. • In this example, three HR users were invited but any one of them can do the job -- increasing process reliability and shortening time to completion. Key concepts: • Who is invited to approve a change is determined by policy. • Policy is based on relationships between requester, recipient and authorizer. • A random subset of a users (e.g., members of an HR group) can be chosen. • A further subset of invited users may be sufficient to approve. Invitations go out via e-mail, with responses via authenticated, secure, encrypted web form.
31 May 2018
19
Share Video

1:05
Content: • A manager schedules termination/deactivation for one of his subordinates. • Members of the HR department are invited to approve the change. Key concepts: • Scheduled events, such as deactivation, are modeled using a date attribute in the user's profile. • Access controls determine who can see this date, who can request a change and who must approve a change. • In this example, a user's manager and anyone in HR can see/edit this date, but the user cannot. If the manager requests a change, HR must approve it. Conversely, if HR requests a change, the manager will be asked to approve it. • Once the request is approved and stored in the user's profile, other processes take care of the deactivation process. The workflow component is simply for setting this date.
31 May 2018
27
Share Video

1:33
Content: • A user is guided through the access request process. • The video starts with the user encountering a Windows "Access Denied" error dialog. • The user is guided to a request to for membership in the appropriate Active Directory security group. Key concepts: • Users frequently need access to new shares, folders, etc. but they don't understand access control lists (ACLs) or security groups. • To attain high user adoption for self-service security entitlement management, it is important to implement a system which allows for this gap in users' knowledge.
31 May 2018
18
Share Video