Identity and Access Management
The process for creating a User ID (NID). This could be for a student, affiliate, employee or Friend ID (FID). Third Party Access (TPA) for Parents/ Guardians uses the FID creation process.Identity and Access Control security technology that provides customizable services for creating and managing public key certificates used in software security systems that employ public key technologies.Stores directory data and manages communication between users and domains, including logon processes, authentication, computers, system management, and directory searches. This service includes the following sub-services: LDAP, Authentication and Authorization, DFS, DFS-R, Group Policy, NTP, Computer Domain Join, AD Integrated BitLocker, LAPS.Site to allow users to manage the security of their Network ID.WSU ITS provides Single Sign-On (SSO) Federation services for WSU departmental IT professionals to securely authenticate each person that comes to their web application, known as a Service Provider. The supported service is cloud-provided by Okta.Service that allows for searching, monitoring, and analytics of machine-generated logs via a web interface and can generate graphs, reports, alerts, dashboards, and visualizations.Request to modify existing Firewall rules regarding perimeter access.Service that allows the Information Security Services team members to identify, respond to, and report a data security concern.Service adds logs to Central Log Monitoring.A Risk Assessment is used to identify IT security risks associated with a system/service. A Security Assessment must be completed before requesting a Risk Assessment. Security Assessments evaluate the security controls of in an information system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome. Custom services built upon request.Request access to the Splunk service.Service allows subscribed customers to request and obtain SSL certificates of three different types.Compliance and risk review for technology contracts and services.This service provides for the identification of vulnerabilities via vulnerability scanning, patch
releases, configuration review, and compliance.