White Paper tenfold successfully introduce IAM

With the tenfold software, you choose an Identity and Access Management System that enables users to automatically control and log user and resource management across system boundaries, and to create audit-proof reports.

This document is intended to explain the most important prerequisites necessary to introduce tenfold and make efficient use of it.

Requirements

Ideally, for a successful launch of tenfold, the following actions should be taken:

Cleanup of Active Directory
In order to map the user management processes in tenfold and to be able to use the possibilities of automatic, role-based resource allocation, the Active Directory (AD) and the user master data contained therein must be completely and consistently stored for all attributes (see below) ...

Introduction of domain-bound DFS
A Distributed File System (DFS) combines several physical resources into one virtual resource ...

Microsoft Best Practices folder permissions - for security and efficiency
Tenfold works exclusively with Microsoft Best Practices to assign and manage file server permissions. The method used is called AG-DL-P principle ...

The complete content and further recommendations can be found summarized in our whitepaper.

Request download

GermanEnglish