compliances , information-rights-management , security

Sample – User Roles Server Assessment Considerations – Part 1

November 25, 2013

Partial list of questions to consider.

Initial reason for purchase / business problem
Most common Use Cases  with respect to Provisioning and Identity Management
a)  Delegation of permissions
b) Property generation / validation
c) User provisioning / de-provisioning
Review Authentication Management model (i.e. resource(s) allocated to manage Authentication
Business Benefits realized from initial investment, Describe any ROI
Are you using the product in ways you didn’t originally anticipate and if so, how?
Did you originally look at any competitive solutions and if so, which ones?
How are you utilizing Roles?
How are you utilizing Policies?
How are you utilizing Attestation?
How are you utilizing SPML?
How are you utilizing approval workflow?
Are you using Authentication to administer AD?
Are you using Authentication to administer DNS?
Are you using Authentication to administer Unix enabled AD accounts?
How are you utilizing Self Service?
How are you utilizing Quick Connect?
How are you utilizing De-provisioning?
Describe the nature of any custom web extensions utilized in your deployment
Describe the nature of any custom scripts utilized in your deployment
How are you utilizing the web interface?
What is the size of your configuration database?
Is your management history co-located there?
What group do you have defined as your Authentication Admin? (see registry)
Did you use the built-in roles, or copy them?
How is your SQL replication configured?
Is the operational DC configured on the web interface?

www.bestitdocuments.com