This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 29 lines
!!! Overview
In telecommunication, [{$pagename}] involves the process of preparing and equipping a network to allow it to provide (new) services to its users.
In National Security/Emergency Preparedness telecommunications services, "provisioning" equates to "initiation" and includes altering the state of an existing priority service or capability.[1]
The concept of network provisioning or service mediation, mostly used in the telecommunication industry, refers to the provisioning of the customer's services to the network elements.[clarification needed] It requires the existence of networking equipment and depends on network planning and design.
In a modern signal infrastructure employing information technology (IT) at all levels, there is no possible distinction between telecommunications services and "higher level" infrastructure.[citation needed] Accordingly, provisioning configures any required systems, provides users with access to data and technology resources, and refers to all enterprise-level information-resource management involved.
Organizationally, a CIO typically manages provisioning, necessarily involving human resources and IT departments cooperating to give users access to data repositories or grant authorization to systems, network applications and databases based on a unique user identity that is appropriate for their use hardware resources, such as computers, mobile phones and pagers.
As its core, the [{$pagename}] process monitors [access Control] and [privileges] to ensure the security of an enterprise's resources and user privacy.
As a secondary responsibility, it ensures compliance and minimizes the [vulnerability] of systems to penetration and abuse. As a tertiary responsibility, it tries to reduce the amount of custom configuration using boot image control and other methods that radically reduce the number of different configurations involved.
Discussion of provisioning often appears in the context of virtualization, orchestration, utility computing, cloud computing, and open-configuration concepts and projects. For instance, the OASIS Provisioning Services Technical Committee (PSTC) defines an XML-based framework for exchanging user, resource, and service-provisioning information - [SPML] ([Service Provisioning Markup Language]) for "managing the provisioning and allocation of identity information and system resources within and between organizations".
!! From the IT Perspective
From the IT Perspective there are two primary [{$pagename}] processes that are typically handled within an [Identity Management Architecture] and include:
* [User Provisioning]
* [Resource Provisioning]!! Some Additional [{$pagename}] Processes
* [Self-provisioning] - Represents when there is a process that allows [end users|Entity] or designated [Entities] are able set perform requests for [User Provisioning] or [Resource Provisioning] without the direct intervention of an IT organization or a service provider.
* [Self-regulating Provisioning] - Represents an automated process where when changes within data on the [Digital Identity] results in changes within the [User Provisioning] or [Resource Provisioning]
* [Provisioning Policies]
* [Provisioning Auditing]
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]