From: Adaptive identity and access management—contextual data based policies
System | Data type | Examples | Used |
---|---|---|---|
HR system 1..n | Employee master data | Name, personnel number | x |
Employee context | Login state of an employee regarding different applications, vacation, criticality of entitlements | ||
Application 1..n | Account information | Account identifiers, account attributes (e.g. system accounts, privileged accounts) | x |
Entitlement information | Entitlement identifiers, entitlement attributes (e.g. critical entitlements) | x | |
Account activity | Permission activations, activation sequences, type of permission usage, requested resources | ||
IAMS | Identity information | Accounts, corresponding systems, entitlements, roles | x |
Entitlement/role information | Corresponding systems, attributes | x | |
Provisioning information | Requesting entities, affected resources, approving authorities, decisions | x |