THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services Identity Management Brief Presentation to.

Slides:



Advertisements
Similar presentations
Integrated Banking Systems Introduction: IBS-ITech combines powerful central accounting with the capacity to allow the work team to use automated, customizable.
Advertisements

Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
UT San Antonio PeopleSoft Project September 2010.
Creating Executive Awareness about Information Security Joy Hughes, VP, George Mason Univ. Jack Suess, VP, UMBC EDUCAUSE.
HP Quality Center Overview.
An Open Source Google Apps Integration (Bboogle) Patricia Goldweic, Sr. Software Engineer, Northwestern University.
BUSINESS PROCESS IMPROVEMENT INITIATIVES Chad Cleveland June 18, 2014 BAAF Meeting.
2009 Architecture Plan Overview 2009 Architecture Plan Overview.
Information Security Policies and Standards
“The 21st Century CIO” Mark Polansky
© 2006 IBM Corporation IBM Software Group Relevance of Service Orientated Architecture to an Academic Infrastructure Gareth Greenwood, e-learning Evangelist,
Keystone Technology Plan Presentation to Chesapeake Bay Program Information Management Subcommittee May 19, 2004 Nancie L. Imler Chief Information Officer.
Copyrights 2002 Introduction to SAP Enterprise Portals September SAP Enterprise Portal 101 Naeem Hashmi Chief Technology Officer Information Frameworks.
Employee Central Presentation
1 MAIS & ITSS FY09 Priorities Joint UL Meeting October 27, 2008.
Identity Management, what does it solve By Gautham Mudra.
The topics addressed in this briefing include:
Bridge Design-Rating 2014 Administrative Overview RADBUG Meeting Traverse City, MI Judy B. Skeen, P.E.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
General Services Administration Shared Cloud Platform model Informational Brief June 2012 Sonny Hashmi – GSA Deputy CIO.
Energy Ecosystem Overview David Miller Chief Security Officer.
A NASSCOM ® Initiative DSCI-KPMG Survey 2010 State Of Data Security and Privacy in the Indian Banking Industry Vinayak Godse Director- Data Protection,
C2- How Businesses Use Information Systems. BMW Oracle’s USA in the 2010 America’s Cup.
Enterprise Business Intelligence Consolidated Business Intelligence Project February 2014 Management Overview.
Micro Finance Management System (MFMS)
What is Workflow?  Workflow or Business Process Management (BPM) consists of Processes, States and Actions.  A Process (e.g. Customer Order fulfillment)
Bboogle: Updates and Experience Patricia Goldweic, Sr. Software Engineer, Northwestern University Brian Nielsen, Project Manager, Faculty Initiatives,
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Information Assurance The Coordinated Approach To Improving Enterprise Data Quality.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
RECALL THE MAIN COMPONENTS OF KIM Functional User Interfaces We just looked at these Reference Implementation We will talk about these later Service Interface.
Roles and Responsibilities
PIV 1 Ketan Mehta May 5, 2005.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
GOOGLE APPS IN SCHOOLS. Overview Google apps addresses all of a school’s communication and collaboration needs. – , calendaring, document creation.
KUALI IDENTITY MANAGEMENT Provides services for Identity and Access Management in Kuali Integrated Reference Implementations User Interfaces An “integration.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
How eNet4S can benefit your project? eNet4S Software Solution Business Team Chief Technology Officer July 11, 2006.
A Combat Support Agency Defense Information Systems Agency UNCLASSIFIED UNCLASSIFIED Spectrum Access: The Tools to Connect GEMSIS 15 Aug 2011.
Information Architecture: Planning for Success A Presentation to the Data Management Association National Capitol Region January 8, 2002 Ted Griffin Office.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Red Deer College February 8, 2010 William Miles, CISSP.
UT San Antonio PeopleSoft Project September 2010.
Outsourcing Student at USC Institute for Computer Policy and Law Cornell University, August 2008 Asbed Bedrossian Director of Enterprise Applications.
SAP Identity Management 7.2 Implementation
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
KIM: Kuali Abstraction Layer for Identities, Groups, Roles, and Permissions.
Best Practices in Enterprise IAM Liza Lowery Massey Montana Government IT Conference December 6, 2007.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
State of Georgia Release Management Training
THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services BAAF UGAMail Update Shawn Ellis Director,
Understanding deployment issues on the Supply Chain Ann Harding, SWITCH, Nicole Harris, TERENA Cambridge July 2014.
Sponsored by: 1 The State of Corporate A Survey of IT Professionals October 2013.
Topic 4:.  As with any disruptive innovation, separating the reality from the mythical can be a challenge for any prospective customer trying to accurately.
Quarterly Customer Meeting Office 365 License Activation and Office 365 Cloud Services Assessment Status April 2014.
POS 410 GENIUS Education Expert/pos410genius.com FOR MORE CLASSES VISIT
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Education Solution.
Shared Services and Third Party Assurance: Panel May 19, 2016.
Productivity Architect Meet Chris Bortlik Author, Blogger, Speaker.
RSA Professional Services RSA SecurID Solution Design and Implementation (D&I) Services.
Digital Asset Management & Storage Program Program Summary
Shibboleth 2.0 IdP Training: Introduction
Data, Policy, Stakeholders, and Governance
Managing Complexity (through Enterprise Architecture)
Presentation transcript:

THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services Identity Management Brief Presentation to the Information Technology Management Forum February 7, 2008

THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services What is Identity Management? “the management of information required to identify who a particular user is and to determine what enterprise resources they can access”. An authoritative place to store identities A system to synchronize the identities with other systems Systems to leverage the identities for single-sign-on Systems to facilitate internal and external entities’ integration and access to the identities Identity Management architectures must be dedicated only to storing and distributing identities Identity Management is not data management Identity Management is not choosing a unique identifier

THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services Current State We have a provisioning system in place a running We have a identity store in place and running Many applications currently authenticate to the identity store (UGAMail, WebCT, UGA Payroll) Many applications use their own proprietary identity store to authenticate users (UGA Calendar, mainframe applications) Externally hosted applications have no way to integrate with the identity store (external accounts, iTunesU) Process to create and remove a identity is labor-intensive, error- prone, and insecure Administration and engineering of the identity management systems is not dedicated to those systems

THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services Our Strategy Embrace the diversity of how identity stores are currently managed Architect with decentralized management of identities in mind Automate the workflows involved in creating and removing a identity Leverage currently in place systems where industry trends and support is strong Leverage a functional committee to make human interface and workflow decisions Leverage a technical committee to provide decision support for the functional committee (provide options for them) Don’t create any dependencies on a particular unique ID number Don’t allow any other functionality besides managing identities to enter any requirements (will not store grades, will not store salary)

THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services Risks Securing Sensitive Data Continuing in insecure process exposes UGA to significant legal risk (DMCA, FERPA, HIPAA) Productivity Continuing in inefficient process exposes UGA to productivity loss Continuing without a authoritative identity store exposes UGA to productivity loss (within IT functions) Federation Continuing without a coherent strategy and architecture exposes UGA to risks when wanting to collaborate with others on research and academic scholarship

THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services Next Steps Approval by the EMT of functional and technical committee scope Communications plan for the identity management strategy Funding for a requirements analysis effort for the scope provided in executive brief involving collaboration with the functional committee and customers Request for funding for detailed plan will follow requirements analysis