Sample – User Roles Server Assessment Considerations – Part 1
November 25, 2013Partial list of questions to consider.
Initial reason for purchase / business problem | |
Most common Use Cases with respect to Provisioning and Identity Management | |
a) Delegation of permissions | |
b) Property generation / validation | |
c) User provisioning / de-provisioning | |
Review Authentication Management model (i.e. resource(s) allocated to manage Authentication | |
Business Benefits realized from initial investment, Describe any ROI | |
Are you using the product in ways you didn’t originally anticipate and if so, how? | |
Did you originally look at any competitive solutions and if so, which ones? | |
How are you utilizing Roles? | |
How are you utilizing Policies? | |
How are you utilizing Attestation? | |
How are you utilizing SPML? | |
How are you utilizing approval workflow? | |
Are you using Authentication to administer AD? | |
Are you using Authentication to administer DNS? | |
Are you using Authentication to administer Unix enabled AD accounts? | |
How are you utilizing Self Service? | |
How are you utilizing Quick Connect? | |
How are you utilizing De-provisioning? | |
Describe the nature of any custom web extensions utilized in your deployment | |
Describe the nature of any custom scripts utilized in your deployment | |
How are you utilizing the web interface? | |
What is the size of your configuration database? | |
Is your management history co-located there? | |
What group do you have defined as your Authentication Admin? (see registry) | |
Did you use the built-in roles, or copy them? | |
How is your SQL replication configured? | |
Is the operational DC configured on the web interface? |
www.bestitdocuments.com