Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Organizes software authorizations so that applications, tools and services can match the access needed to perform job functions. 
  2. Provides Enterprise Level Authentication and Authorization
  3. Provides Role based authorization, including attribute based authorization elements as well
  4. The frameworks exposure layer should be consumable by any product or technology.
  5. The frameworks should be highly available with a resilient data store
  6. Provides administration functions by GUI and management API's.
  7. Provides consistent client plugins to access authentication and authorization frameworks functions
  8. Provides support for multi-tenancy
  9. Provides support for SSL Certificate management
  10. Provides support for OAuth2.
  11. Support Microservices ( Docker/Kubernetes )
  12. Provide hardware security plugin for storing private keys and for performing crypto operations that require private keys.
  13. Management of Secrets and Protection of secrets

CADI ( Code Access Data Identity) - Addresses the Runtime Elements of Access and Identity.

...