What Is Unsolicited Login? Unsolicited login is the functionality where users access some part or feature of an application anonymously, but another part or feature requires them to login/authenticate before using those features. An Unsolicited Login Scenario For OAM Let’s assume that there’s an application ABC which we access using www.abc.com. By default, any user […]
[vc_row][vc_column][vc_column_text]One of the many exciting features of the Hitachi ID Identity and Access Management (IAM) Suite is the web services API which is accessible using SOAP over HTTPS with a WSDL specification. This API allows other enterprise applications to access workflow request queue, user data and resources that exist within an instance of the Hitachi […]
We’ve put together a short list of some best practices for unique login names. Users having a unique name is important for auditing and security. Define a method early on to help assure users are always unique across all systems and helps pinpoint any security and audit concerns quickly. Avoid recognizable naming standards. Such as […]