Security and Access Control

Expert-defined terms from the Professional Certificate in IBM Certified Maximo Manage v9.0 Functional Deployment course at Greenwich School of Business and Finance. Free to read, free to share, paired with a globally recognised certification pathway.

Security and Access Control

Access Control #

Access control refers to the process of restricting or allowing access to resour… #

In the context of IBM Certified Maximo Manage v9.0 Functional Deployment, access control mechanisms are used to ensure that only authorized users can view, edit, or delete data within the Maximo application. This helps in maintaining data security and preventing unauthorized access to sensitive information.

Authentication #

Authentication is the process of verifying the identity of a user attempting to… #

In the context of security and access control in IBM Certified Maximo Manage v9.0 Functional Deployment, authentication mechanisms such as passwords, biometrics, or multi-factor authentication are used to ensure that only authorized users are granted access to the Maximo application.

Authorization #

Authorization is the process of determining what actions a user is allowed to pe… #

In the context of IBM Certified Maximo Manage v9.0 Functional Deployment, authorization rules are used to define the permissions and access levels of users within the Maximo application. This helps in controlling the actions that users can take and ensuring data security.

Encryption #

Encryption is the process of encoding data in such a way that only authorized pa… #

In the context of security and access control in IBM Certified Maximo Manage v9.0 Functional Deployment, encryption techniques are used to protect sensitive data stored within the Maximo application. This helps in preventing unauthorized access to confidential information.

Firewall #

A firewall is a network security system that monitors and controls incoming and… #

In the context of IBM Certified Maximo Manage v9.0 Functional Deployment, firewalls are used to protect the Maximo application from unauthorized access and cyber threats. By setting up firewalls, organizations can ensure that their data is secure and inaccessible to malicious actors.

Identity Management #

Identity management is the process of managing the identities of users within a… #

In the context of IBM Certified Maximo Manage v9.0 Functional Deployment, identity management systems are used to create, update, and delete user accounts within the Maximo application. This helps in ensuring that only authorized users have access to the system and its data.

Multi #

factor Authentication:

Multi #

factor authentication is a security process that requires users to provide two or more forms of verification before gaining access to a system or application. In the context of security and access control in IBM Certified Maximo Manage v9.0 Functional Deployment, multi-factor authentication is used to enhance the security of the Maximo application. By requiring users to provide multiple forms of verification, such as a password and a one-time code sent to their mobile device, organizations can reduce the risk of unauthorized access.

Role #

Based Access Control (RBAC):

Role #

Based Access Control (RBAC) is a method of restricting access to resources based on the roles of users within an organization. In the context of IBM Certified Maximo Manage v9.0 Functional Deployment, RBAC is used to define the permissions and access levels of users within the Maximo application based on their roles, such as administrator, technician, or supervisor. This helps in simplifying access control management and ensuring that users only have access to the resources they need to perform their job functions.

Single Sign #

On (SSO):

Single Sign #

On (SSO) is a method that allows users to access multiple applications with a single set of login credentials. In the context of security and access control in IBM Certified Maximo Manage v9.0 Functional Deployment, SSO is used to streamline the login process for users accessing the Maximo application. By implementing SSO, organizations can improve user experience, reduce password fatigue, and enhance security by eliminating the need for users to remember multiple login credentials.

Token #

Based Authentication:

Token #

based authentication is a method of verifying the identity of a user by issuing a unique token that grants access to a system or application. In the context of IBM Certified Maximo Manage v9.0 Functional Deployment, token-based authentication is used to authenticate users accessing the Maximo application. By issuing tokens that expire after a certain period or usage, organizations can enhance security and prevent unauthorized access to the system.

Vulnerability #

A vulnerability is a weakness in a system or application that can be exploited b… #

In the context of security and access control in IBM Certified Maximo Manage v9.0 Functional Deployment, vulnerabilities in the Maximo application can pose a risk to data security and integrity. It is essential for organizations to regularly assess and patch vulnerabilities to prevent potential security breaches and protect sensitive information.

May 2026 cohort · 29 days left
from £99 GBP
Enrol