DISA seeks identity management technology

New access management methods may improve interoperability

Defense Department officials want to learn more about emerging identity and access management technologies used to get access to the department's computers and networks, according to an information request from the Defense Information Systems Agency (DISA).

DISA wants to develop a new privilege management strategy for DOD, according to the June 15 announcement.

DISA officials plan to evaluate emerging identity management techniques such as role-based access control, attribute-based access control, and risk-adaptive access control.

With role-based access control, workers are not assigned individual permissions because organizations create roles for various job functions and permissions to access certain systems are assigned to specific roles. Staff members can be assigned various roles to have access to different systems, according to DISA.

DOD is examining the new methods to help improve interoperability with other federal agencies and coalition partners, the announcement states. The new identity management systems should also let DOD more easily support both anticipated and unanticipated users on its systems.

DISA is requesting that only small businesses respond to the information request, and businesses that submit information should describe their experience managing the technical and functional requirements associated with developing complex access management systems, the announcement states.

Businesses should also describe their experience with implementing systems incorporating role-based access control, attribute-based access control, policy-based access control, or risk-adaptive access control, the agency said.

Responses are due by June 22.


About the Author

Doug Beizer is a staff writer for Federal Computer Week.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group