Secure and coherent external user identity management

Pro gradu käsittelee ulkoisten identiteettien hallintaa kohdeyrityksessä. Identiteettien hallinnan tärkeys yritysten tietoturvan hallintamekanismina korostuu päivä päivältä. Identiteetin hallinnan tärkeys korostuu varsinkin kun käsitellään ulkopuolisten käyttäjien identiteettejä. Ulkoiset eivät voi...

Full description

Bibliographic Details
Main Author: Kähtävä, Konsta
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:eng
Published: 2023
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/88759
_version_ 1826225682978439168
author Kähtävä, Konsta
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Kähtävä, Konsta Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Kähtävä, Konsta Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Kähtävä, Konsta
datasource_str_mv jyx
description Pro gradu käsittelee ulkoisten identiteettien hallintaa kohdeyrityksessä. Identiteettien hallinnan tärkeys yritysten tietoturvan hallintamekanismina korostuu päivä päivältä. Identiteetin hallinnan tärkeys korostuu varsinkin kun käsitellään ulkopuolisten käyttäjien identiteettejä. Ulkoiset eivät voi tietoturvallisista syistä saada vastaavia oikeuksia kuin sisäiset identiteetit. Pro Gradussa esitellään malli, joka voisi parantaa ulkoisten identiteettien hallintaa. Mallin materiaali on koottu kirjallisuudesta, dokumentaatioista ja haastatteluista saatujen tietojen avulla. Mallin parannusehdotukset yleisellä tasolla koskevat informaation virtauksen, dokumentaatioiden ja politiikkojen parantamista. This thesis examines a company’s external user identity management. Nowadays, identity management has become an important security mechanism for companies worldwide. Identity management is even more evident when talking about external users who are not inner employees of a company and hence cannot receive the same accesses nor privileges as the company’s own employees do. By gathering material from the literature, documentation, and interviews, this thesis proposes a model on how the identity management of external users can be enhanced. Enhancement propositions on an abstract level deal with the information flow, available documentation, and policy enhancements.
first_indexed 2024-05-08T20:04:51Z
format Pro gradu
fullrecord [{"key": "dc.contributor.advisor", "value": "Frantti, Tapio", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "K\u00e4ht\u00e4v\u00e4, Konsta", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-08-30T05:45:11Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-08-30T05:45:11Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/88759", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Pro gradu k\u00e4sittelee ulkoisten identiteettien hallintaa kohdeyrityksess\u00e4. Identiteettien hallinnan t\u00e4rkeys yritysten tietoturvan hallintamekanismina korostuu p\u00e4iv\u00e4 p\u00e4iv\u00e4lt\u00e4. Identiteetin hallinnan t\u00e4rkeys korostuu varsinkin kun k\u00e4sitell\u00e4\u00e4n ulkopuolisten k\u00e4ytt\u00e4jien identiteettej\u00e4. Ulkoiset eiv\u00e4t voi tietoturvallisista syist\u00e4 saada vastaavia\noikeuksia kuin sis\u00e4iset identiteetit. Pro Gradussa esitell\u00e4\u00e4n malli, joka voisi parantaa ulkoisten identiteettien hallintaa. Mallin materiaali on koottu kirjallisuudesta, dokumentaatioista ja haastatteluista saatujen tietojen avulla. Mallin parannusehdotukset yleisell\u00e4 tasolla koskevat informaation virtauksen, dokumentaatioiden ja politiikkojen parantamista.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis examines a company\u2019s external user identity management. Nowadays, identity management has become an important security mechanism for companies worldwide. Identity management is even more evident when talking about external users who are not inner employees of a company and hence cannot receive the same accesses nor privileges as the company\u2019s own employees do. By gathering material from the literature, documentation, and interviews, this thesis proposes a model on how the identity management of external users can be enhanced. Enhancement propositions on an abstract level deal with the information flow, available documentation, and policy enhancements.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-08-30T05:45:11Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-08-30T05:45:11Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "49", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "identity and access management", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "identity management", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "external user Identity management", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "identity life cycle management", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Secure and coherent external user identity management", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202308304796", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "p\u00e4\u00e4synvalvonta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "todentaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "safety and security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "access control", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "authentication", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/collections/archival-workstation).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
id jyx.123456789_88759
language eng
last_indexed 2025-02-18T10:54:07Z
main_date 2023-01-01T00:00:00Z
main_date_str 2023
publishDate 2023
record_format qdc
source_str_mv jyx
spellingShingle Kähtävä, Konsta Secure and coherent external user identity management identity and access management identity management external user Identity management identity life cycle management Kyberturvallisuus 601 tietoturva turvallisuus pääsynvalvonta todentaminen data security safety and security access control authentication
title Secure and coherent external user identity management
title_full Secure and coherent external user identity management
title_fullStr Secure and coherent external user identity management Secure and coherent external user identity management
title_full_unstemmed Secure and coherent external user identity management Secure and coherent external user identity management
title_short Secure and coherent external user identity management
title_sort secure and coherent external user identity management
title_txtP Secure and coherent external user identity management
topic identity and access management identity management external user Identity management identity life cycle management Kyberturvallisuus 601 tietoturva turvallisuus pääsynvalvonta todentaminen data security safety and security access control authentication
topic_facet 601 Kyberturvallisuus access control authentication data security external user Identity management identity and access management identity life cycle management identity management pääsynvalvonta safety and security tietoturva todentaminen turvallisuus
url https://jyx.jyu.fi/handle/123456789/88759 http://www.urn.fi/URN:NBN:fi:jyu-202308304796
work_keys_str_mv AT kähtäväkonsta secureandcoherentexternaluseridentitymanagement