From the course: CompTIA Security+ (SY0-701) Cert Prep

Unlock the full course today

Join today to access over 24,000 courses taught by industry experts.

Registration and identity proofing

Registration and identity proofing

- [Instructor] In every identity and access management solution, users must be given initial credentials when they are created in the system as entities. The registration process includes gathering information about a user and creating a corresponding entity in the system. The identity proofing process ensures that the user presenting themselves for registration is who they claim to be. Let's take a look inside these processes. Registration consists of four steps. First, someone must make a request for the creation of a new entity in the system. For example, a hiring manager might initiate a request to create an entity for a new employee, once that new employee accepts a job offer. Second, someone must approve the request. This should be someone different from the requester. An approval authority should be clearly defined in policy. In the example of hiring a new employee, the request might require approval by a department manager or if the requester is the department manager, a…

Contents