Establish agent service identities; implement credential issuance/rotation; control connector auth; log authentication events
Identity and access / Sub-Thread
Identity proofing and authentication
Identity and accessL
Thread navigation
Key activities
Current metadata
T-shirt size
L
Recommended C-suite owner
CISO
Recommended operational owner
IAM Product Owner / Head of IAM
Impacted Level 1 areas
Impacted Level 2 areas
Impacted Level 3 activitiesgrouped by Level 1
Governance
1 linked Level 3 activities
Process & tooling
1 linked Level 3 activities
Technology
1 linked Level 3 activities
Return
Back to Identity and access
Back to thread detail
Hierarchy
Return to the hierarchy view
Open the map