Abstract:
The functional and organizational charts and principles of the identity and access management of the users’ rights, developed for the two strategies to information protection, which are accepted by the organization or cloud computing community, are stated. The works organization procedure to create a centralized identity and access management system of the users' rights as a part of the information security maintenance system for high available collective data-processing centers is defined.
Keywords:high availability; information security; data-processing center.