A reliable identity consists of:
His/her business context and an indication of the reliability of those details
IAMconnected provides reliable identities in order to enable good access management for port logistics.
Community Identity Provider
Whereas facilities for access management are often offered at the level of the organisation, Portbase wants to make facilities available at the level of the community. In order to make this possible, we value self-service and self-cleansing.
You prove that you are the account holder by providing not only the password (‘what you know’), but also the one-time code that appears in your smartphone app (‘what you have’).
A digital representation of a person: your identity
You use an IAMconnected account to register with an organisation and use the services that are available to that organisation.
It is impossible for IAMconnected to check the reliability of every individual and organisation. That is why we offer organisations the ability to easily enhance the reliability of identities for employees and the organisation itself. IAMconnected is transparent to the extent that organisations actually make use of that option.
Because there are thousands of companies and tens of thousands of employees working in and around the Dutch ports, the decision has been taken to enable self-service as far as possible without losing control.
Access control is an area of focus within the field of information security aimed at allowing only the right people the right access to company resources.
Important principles in this regard are:
In summary, it is about retaining control with regard to the questions: who is allowed to do what, when is it allowed and why?
Good access management not only ensures that restrictions are in place but, more importantly, that you are able to do your job.
Additional details relating to you as an employee of a particular organisation
Currently, the business context consists of:
Please note: Only HbR/King users can currently enter (organisation type and) logistics roles
It is up to service providers themselves to determine what level of reliability is appropriate for their services. Failure to comply with these requirements may, in extreme cases, result in exclusion from use of the service.
You can change your permissions via 'customise preferences'.