zerion identity management
WHAT IS ZIM?
ZIM, or Zerion Identity Management, is a web service that helps securely control access to Zerion resources for you and your users. ZIM controls who can use your Zerion resources (authentication) and what resources they can use and in what ways (authorization).
The business IT environment is ever evolving and managing access has become a big administrative burden. As users switch between projects and their duties change, it could result in changes to their access level. Users with privileges beyond their requirement are potentially unsafe and can lead to data loss or even theft.
WHAT MAKES ZIM SAFE AND EFFICIENT?
ZIM uses IAM technology to initiate, capture, record and manage user identities and their related access permissions in an automated fashion. This ensures that access privileges are granted according to one interpretation of policy and all individuals and services are properly authenticated, authorized and audited.
WHAT ARE THE GOALS OF ZIM?
- Centralize iForm, Dataflow automation and future micro services login authentication and access management.
- Create an expandable access management system for future micro services.
WHAT ARE THE CORE OBJECTS OF ZIM?
A user is an entity that you create in Zerion Identity to represent the person or service using it when interacting with Zerion Identity.
A group is a collection of users. You can use groups to specify permissions for a collection of users, which can make those permissions easier to manage for those users.
Permissions let you specify who has access to Zerion resources, and what actions they can perform on those resources.
A policy is a document that formally states one or more permissions.