Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

The Modernization and Migration Management (M3) Playbook has a new look! Explore our new features here.

M3 Playbook > Phase 4: Migration > 4.7 Define Roles and User Access

4.7 Define Roles and User Access

Technology

Task Activities

  1. Shared

    Document roles and access rights, segregation of duties, identification (ID) request and ID management processes based on Identity, Credentials, and Access Management Framework (ICAM)

  2. Shared

    Finalize roles and responsibilities for granting user access in Operations and Maintenance (O&M)

  3. Provider

    Implement Security Configuration for user roles and user access as documented in ICAM

  4. Shared

    Assign user access rights to employees

  5. Provider

    Load production user accounts

  6. Provider

    Test production user accounts

  7. Shared

    Provide credentials to end users for testing, training, and production

4.7 Best Practices

  • Have an ID management tool, ID request process, and contact center procedures to resolve access related issues in place before cutover
  • Provide sufficient security access to the deployment team to perform their tasks effectively in advance of deployment
  • Establish security roles and responsibilities well in advance of deployment to resolve issues while time allows

Stakeholders

Customer

  • Program Manager
  • Functional Lead
  • Technical Lead/Solution Architect
  • Security Lead
  • Training Lead
  • Information Systems Security Officer (ISSO)
  • Network SME
  • PMO Lead
  • Change Management Lead

Provider

  • Program Manager
  • Functional Lead
  • Technical Lead/Solution Architect
  • Security Lead
  • Training Lead
  • Information Systems Security Officer (ISSO)
  • Network SME
  • PMO Lead
  • Change Management Lead

Inputs

Outputs

  • Baselined List of ID Credentials