O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Identity and provisioning life cycle

In an identity and provisioning life cycle, there are two distinctive activities. One is user management and the other is system or application access. Furthermore, the life cycle consists of the assignment of privileges through roles and delegation.

Observe the following illustration, a typical identity and provisioning life cycle consists of these things:

  • Enrollment of users, which is creating and/or registering user accounts
  • Determining roles, privileges, and access requirements to systems and applications
  • Provisioning user accounts to systems
  • Ongoing updates based on changes in roles, privileges, and access requirements
  • Deprovisioning in the case of user retirement or termination

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required