Chapter 10. A Role-based Approach to Automated Provisioning and a Personalized Portal
by Rex Thexton, Nishidhdha Shah, and Harish Gaur
Customers, partners, and employees all need access to enterprise data. But as IT enterprises grow more complex with new systems, interfaces, and applications, it becomes increasingly challenging to control and monitor who can access what IT resources.
Risks of ineffective permissions are substantial. Unauthorized users could gain access to IT resources and wreak havoc on the applications and data. Companies could risk not meeting rigorous security and privacy compliance requirements. And the IT help desk could spend countless hours mitigating these risks.
There are typically two areas in which the IT department feels ...