Steps
|
Process and Activity
|
Roles
|
Work products
|
Tools
|
Mike comes in through his company's portal and signs in by providing his credentials.
|

Security Management

Operate Security Protection Mechanisms
|

Requestor
|

Security Monitoring Data
|
|
He is authenticated depending on the access policies of his company and a session is created.
|

Security Management

Operate Security Protection Mechanisms
|

Requestor
|

Security Monitoring Data
|
|
He clicks the link Healthcare options and signs into the Intranet of the
healthcare provider.
|

Security Management

Operate Security Protection Mechanisms
|

Requestor
|

Security Monitoring Data
|
|
A single sign-on token user session is created with Mike's attributes.
|

Security Management

Operate Security Protection Mechanisms
|

Requestor
|

Security Monitoring Data
|
|
Mike's information is verified which ensures he is an employee of his company.
|

Security Management

Operate Security Protection Mechanisms
|

Requestor
|

Security Monitoring Data
|
|
He can now access his health insurance plan without another sign-in.
|

Security Management

Operate Security Protection Mechanisms
|

Requestor
|
None
|
|