Access Control From an Userbase to Agency Applications in the Education Sector
- LANGUAGE: English DATE: Wednesday, September 26, 2018 TIME: 4:00pm AEST, 8:00am CEST
The Ministry of Education in New Zealand can now control access from a wide user base to agency applications in the education sector.
The “Education Sector Logon” service leverages the Microsoft B2C platform for access control to applications used by sector-agencies. There are currently 24 enrolled applications.
In this webinar you will learn:
- How to leverage SAML for connections to supported applications,
- How to manage authentication from the sector IAM data store
- How to ensure appropriate registration of users
- How to maintain service levels via continuous testing and monitoring
- How the technology platform suits your specific needs
Graham Williamson (Senior Analyst and APAC Director) will introduce the topic of customer identity and access management and the importance of an appropriate identity data store. The importance of accommodating cloud-based applications in the access management infrastructure will be addressed.
Shane Day (Chief Technology Officer at UNIFY Solutions) will present on the Ministry’s Education Sector Login brokerage service, describing the components of the system and explaining its innovative features. He will also advise on the learnings of the deployment project.
UNIFY Solutions is the leading provider of workforce, citizen and customer access. Formed in 2004, we believe in secure and trusted accessibility for all people regardless of device or location. We are the key security partner for organizations and governments around the globe, facilitating the delivery of improved services to customers and citizens across the digital and mobile economy. We are dedicated to solving and managing our customers’ Identity, Access and Security challenges. UNIFY Solutions offers a level of service, knowledge and experience that is unparalleled. We have deep experience across multiple industry sectors with customers around the globe.
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.