Session 2: Techniques
In this second session, we focus on the techniques of authorization: the use of claims, authorization in layers, how to externalize it to an entitlement management system, and more.
- Claims mappers and value providers
- Authorization in layers
- Authorization via the Entitlement Management System
- Attribute Governance
- Auditing
Course Outline
Next steps
Ready to modernize IAM?
Start Today - Build security and improve ease of use to stay ahead of the competition.