Identity and Access Management Sample Clauses
The Identity and Access Management clause establishes the rules and procedures for controlling who can access specific systems, data, or resources within an organization. It typically outlines requirements for user authentication, authorization levels, and the processes for granting, modifying, or revoking access rights. By defining these controls, the clause helps protect sensitive information, ensures only authorized personnel can perform certain actions, and reduces the risk of unauthorized access or data breaches.
POPULAR SAMPLE Copied 6 times
Identity and Access Management. Management of accounts, including accounts with privileged access, must prevent unauthorized access and mitigate the impacts thereof.
Identity and Access Management. Identity and Access Management are Services available via their respective MindSphere APIs. These Services are used to manage users, customers/subtenants, roles and scopes. A tenant is a representation of a real-world organization. It covers properties such as users, data, assets, entities and others. A subtenant is a certain limited resource of a tenant representing a subpart of your own real-world organization. In a MindAccess Developer Plan, a subtenant can also represent the real-world organization of a third party that you permit to test Applications for such third parties’ end use. A subtenant is also used to assign Applications and provide access to Applications.
Identity and Access Management. The Solution shall provide capabilities such as user authentication, password policy management, two factor authentication, single sign on, and role-based access.
Identity and Access Management. The Accessing Party will permit access to the other party’s Confidential Information, and, if applicable, its Systems, solely on a need-to-know basis, and the Accessing Party will review such access on an ongoing basis. The Accessing Party will implement identity and access management of all account credentials including but not limited to: segregated accounts and credentials for each unique user, strict management of administrative accounts, and password best practices, strong passwords, removal of default passwords, and secure password storage. The Accessing Party will remove access of all Personnel who no longer require access to the other party’s Systems in accordance with the Accessing Party’s policies including immediate termination on involuntary separation.
Identity and Access Management. Vendor shall:
1. Be in compliance with the CPS Security and Access Control policies (▇▇▇▇▇://▇▇▇.▇▇▇/AcceptableUsePolicy/Pages/platformGuidelines.aspx)
2. Maintain a security plan that is comparable or complies with NIST, SOC 2, ISO 27001, or other CPS approved security frameworks.
3. Report to the Office of School Safety and Security and CIO of CPS within 24-hours of discovery of any security incidents that occur within the Focus VMS that may affect the CPS systems.
4. Maintain audit events according to CPS policy and provide this information to CPS upon request. These audit logs must be kept according to CPS’s records retention policy for student records.
5. Develop and implement policies and procedures regarding the use of information systems that describes how users are to protect against intrusion, tampering, viruses, etc.
6. Employ a simple and secure means to populate CPS administrative user identities in the Focus VMS via API or database push from a SQL database, via the CPS Data Movement team’s methods (SFTP), or via Identity Automation’s RapidConnect product. Human resources must be provided to ensure this provisioning is completed successfully end-to-end.
7. Support service-Vendor-initiated single sign on of CPS administrator users via the ▇▇▇▇ 2.0 SSO standard, using Identity Automation’s RapidPortal identity provider (IDP).
8. Documented security controls in place to protect sensitive and/or confidential information.
Identity and Access Management. ● Must be in compliance with the CPS Security and Access Control policies (▇▇▇▇▇://▇▇▇.▇▇▇/AcceptableUsePolicy/Pages/platformGuidelines.aspx ▇▇▇▇▇://▇▇▇▇▇▇.▇▇▇.▇▇▇/download.aspx?ID=77)
Identity and Access Management o Simplified access management and security o Multi-factor authentication o Conditional access o Advanced security reporting
Identity and Access Management. DSHS will authorize, and will issue, any necessary information access mechanisms, including access identities (IDs) and passwords, and the Contractor agrees that the personnel to whom they are issued will use the same mechanisms. The Contractor will provide these personnel only with the minimum level of access necessary to perform the tasks and functions for which they are responsible. The Contractor will provide DSHS with an updated list of those Contractor personnel who have access to DSHS's and/or it’s Affiliates' systems, software and data, and the level of such access. The Contractor will provide this list at the request of DSHS or at least quarterly in the absence of any request from DSHS.
Identity and Access Management. Provider implements access standards designed to authenticate users, permit authorized access to Data, maintain segregation of duties, and revoke access as part of employee termination or transition.
Identity and Access Management. The University of California utilizes processes and protocols of UCTrust and the InCommon Federation to identify and authenticate members of its community to web- based applications and contracted service providers. Supplier will take all necessary steps to ensure that the Services provided under this Agreement integrate with and utilize these processes and protocols to obtain end-user identity information, including joining InCommon in order to achieve this. Further information about UCTrust is available at ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/irc/itlc/uctrust, and information about InCommon is available at ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇.