The IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team is excited to announce the soft launch of Enterprise Group Services (EGS). EGS allows university departments to automate the management of application and system authorizationAuthorization Authorization refers to the act of determining whether an authenticated user is allowed to access a specific resource or take a specific action. For more information, see our Concepts page. groups. EGS group membership is managed using Attribute-Based Access Control (ABACABAC Attribute-Based Access Control (ABAC) is a mechanism for managing of user access to information systems based on values of user attributes. Attribute-Based Access Control (ABAC) evaluates the access dynamically, using an algorithm that takes “attributes” as an input, and outputs access decision (allow/deny). The attributes are usually user attributes from the user profile, supplemented with context attributes, such as time of access and user’s current location.) rules with members being added and removed automatically.
EGS represents the culmination of IGA Modernization‘s first phase, focused on Group and Role Management and the implementation of midPoint and Grouper, two major components of the InCommon Trusted Access Platform.
EGS is currently in soft launch and working with selected early adopters. While the team will field requests from other University departments, requests from early adopters will be prioritized.
For more information or to request a group, please see our Group and Role Management solutions page or our Group and Role Management business service on UT ServiceNow.