Identity Management & Web SSO Sample Clauses

Identity Management & Web SSO. Identity Management and Web SSO application works on centralized Directory services. DC administrator shall define centralized authentication & authorization mechanisms for users. This would enable associate policies such as security, management etc. on all servers/systems from a centralized console and enhances security, reduces IT complexity and increase overall efficiency. It should be LDAP v3 compliant, in order to have integrated interoperability, security & manageability. It would also enable central authentication thus enabling single sign-on (SSO) mechanism. Therefore this user directory would enable easy manageability that is creation, modification and deletion of user records. It would further help to integrate with various other services like messaging, proxy, etc. The directory services would also be able to cater the requirements for user workstations also. Following components shall be deployed as separate instance • Identity Management shall allow for centralized provisioning users using any of Applications at all data center, thereby allowing users to get access across all applications. It shall integrate with the Web SSO Access Management System. • Web Single Sign-on module shall be provided to enable single sign-on all required applications through Desktop/Laptop/Tablets. • Identity Management software shall include user provisioning for Access Management and OS and Database Software for provisioning. • Identity Management system shall seamlessly integrate with the Access Management, LDAP Server, Operating System and Database Software for provisioning. • The Identity management for user provisioning shall have a workflow for automating approvals for user access management, self-registration and self-care functionality for reducing the administrative load and manual intervention. • The Identity Management Solution for Provisioning shall have the following functionality - o Connectors to Access Controlled Systems o Password Management o Access Rights Accountability o Access Request Approval and Process Automation o Access Request Audit Trails o Distributed Administration o User Administration Policy Automation o Self -Regulating User Administration across Departments • Connectors to Access Controlled Systems shall include the following: • IT shall provide connectors for all Applications that need to be managed. o There shall be a connector development tool to extend support to additional target systems. o Connector communications shall be b...
AutoNDA by SimpleDocs

Related to Identity Management & Web SSO

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Programme Management The Government will establish a programme management office and the Council will be able to access funding support to participate in the reform process. The Government will provide further guidance on the approach to programme support, central and regional support functions and activities and criteria for determining eligibility for funding support. This guidance will also include the specifics of any information required to progress the reform that may be related to asset quality, asset value, costs, and funding arrangements.

  • Classroom Management The certificated classroom teacher demonstrates in his/her performance a competent level of knowledge and skill in organizing the physical and human elements in the educational setting.

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

  • Information Management Information and Records

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

  • Time Management Because of the nature of the duties performed by these supervisors, it is impracticable to apply provisions which prescribe normal work hours. However, it is normally expected that eighty (80) hours of work shall constitute a normal payroll period. It is recognized that these supervisors are responsible for managing and accounting for their own hours of work and that they may work hours in excess of the normal work day and/or payroll period and may make adjustments in hours of work in subsequent work days and/or payroll periods, provided such time management system does not result in overtime payment or guarantee hour-for-hour time off for extra hours worked.

Time is Money Join Law Insider Premium to draft better contracts faster.