Table of Contents

Search

  1. Preface
  2. Introduction to MDM Hub Security
  3. Resources
  4. Roles
  5. Users and User Groups
  6. Security Providers
  7. Application Level Security
  8. Certificate-Based Authentication
  9. Password Hashing
  10. Appendix A: Glossary

Security Implementation Scenarios

Security Implementation Scenarios

You can configure security in
MDM Hub
implementations in multiple ways.
A policy decision point is a specific security check point that determines the identity of users at run time. This is called authentication. A policy decision point also confirms what
MDM Hub
resources users can access. This is called authorization. The degree to which policy decision points are handled internally by the
MDM Hub
, or externally by third-party security providers or other security services, depends on the
MDM Hub
implementation.
The following scenarios are examples of high-level ways that you can configure security in
MDM Hub
implementations:
  • Internal-only policy decision points
  • External User Directory
  • Roles-based Centralized policy decision points
  • Comprehensive Centralized policy decision points
The
MDM Hub
does not reflect changes to resource privileges from an external security provider. If you make changes to resource privileges by using an external security provider, use other means to synchronize the changes with the
MDM Hub
.

0 COMMENTS

We’d like to hear from you!