Search Data.gov
Found 145 dataset(s) matching "Identity Management".
-
Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on a whole range of enterprise...
-
The documents contained in this dataset reflect NASA's comprehensive IT policy in compliance with Federal Government laws and regulations.
-
<p>Pollen data from the manuscript titled: Identity and diversity of pollens collected by two managed bee species while in blueberry fields for pollination, published in Environmental Entomology....
-
Provides a core element of SAA'S Identify and Access Control (IAC) functions with respect to the Agency's critical Mainframe platform. In addition to managing identity verifications,...
-
<p>As of June 28, 2010, the Master Veteran Index (MVI) database based on the enhanced Master Patient Index (MPI) is the authoritative identity service within the VA, establishing, maintaining and...
-
EIE interface with DHS Trusted Identity Exchange. TIE is DHS privacy enhancing service that process identity, credential and access management data for employees and contractors. API is used to...
-
Database used to store client data both Identity and customer relationship management.
-
<p>ADR provides an authoritative data store for shared administrative, demographic, enrollment, and eligibility information which is managed as a corporate asset. This administrative database...
-
<p>Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable electronic transactions with...
-
<p>The Administrative Data Repository (ADR) was established to provide support for the administrative data elements relative to multiple categories of a person entity such as demographic and...
-
Access Lifecycle Management (ALM)/ Trusted Identity Exchange (TIE). The ALM system provides workflow capabilities which contains latest listing of employee's onboarding and offboarding data. This...
-
Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the Security Reports. This is in...
-
<p>Provides architectural guidance and constraints associated with authentication of internal users to VA applications via internal single sign-on solutions, Active Directory, and PIV-only...
-
Items, also referred to as Stock Keeping Units (SKUs), are categories of like resources that are stocked in the warehouse. All resources grouped as an item share key attributes, and are either...
-
<div style='text-align:Left;'><div><div><p><span>An AED is an electronic device that analyzes the heart’s rhythm and tells the user to deliver a defibrillation shock when it is required. An AED is...
-
<p>Design Pattern: �Authentication, Authorization & Audit. Describes how applications should consume the enterprise internal user authentication services</p>
-
<p>User provisioning is the process of associating a digital identity with one or more resource access accounts, which may serve as records for user data and permissions. This may include the...
-
Training resources for access lifecycle management; available to all administrative and operational components.