Identity and Access Management

Slides:



Advertisements
Similar presentations
Omni eControl: Unified management console for multiple applications
Advertisements

© 2006 IBM Corporation Tivoli Identity Manager Express Tivoli Access Manager for Enterprise Single Sign-On (Product Demonstrations) Tivoli Live! – 15 June.
Implementing Tableau Server in an Enterprise Environment
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Agenda AD to Windows Azure AD Sync Options Federation Architecture
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
WSO2 Identity Server Road Map
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Important when you launch Yammer Enterprise Create an engaged and trusted community Decide about User Profile Syncs Various User and Admin.
Identity Management, what does it solve By Gautham Mudra.
Identity and Access Management
A simpler way to manage identities across multiple services Aldo Zanoni, CEO ext. 232
Session Objectives And Takeaways Identify the role of Service Manager in the System Center suite Service Manager - Integrating People, Process and Technology.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
Microsoft Identity and Access Solutions Market Trends and Futures
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
CAS Lightning Talk Jasig-Sakai 2012 Tuesday June 12th 2012 Atlanta, GA Andrew Petro - Unicon, Inc.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Continuous Integration and Code Review: how IT can help Alex Lossent – IT/PES – Version Control Systems 29-Sep st Forum1.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Service Manager & Orchestrator = IT Automation Gavin Kemp & Ellis Paul Microsoft UK Gavin Kemp & Ellis Paul Microsoft UK.
Portal Services & Credentials at UT Austin CAMP Identity and Access Management Integration Workshop June 27, 2005.
DNS DNS changes required to validate domains in Office 365 UPN – User Principal Name Every user must have a UPN UPN suffixes must match a validated.
Secure Mobile Development with NetIQ Access Manager
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Capture This! PO105 James Green. Table of Contents Capture Overview Laserfiche Tools Case Scenarios Questions and Answers.
1 Name of Meeting Location Date - Change in Slide Master Authentication & Authorization Technologies for LSST Data Access Jim Basney
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY 01 OVERVIEW.
Web SSO with Cloud Resources using AD Federation Services
Identity and Access Management
Secure Connected Infrastructure
Using Your Own Authentication System with ArcGIS Online
NATE Blue Button Directory Detailed overview
Identity & Access Management Services
Active Directory Management Software Borna
CIO Council: IAM Update
Shibboleth Integration Fairfield University
SaaS Application Deep Dive
Grid accounting system
Identity and Access Management
Faculty Activity Information Reporting System
Cloud Connect Seamlessly
ESA Single Sign On (SSO) and Federated Identity Management
FIM User Group BHOLD Eihab Isaac (FIM MVP) 11/14/2018
Collaborative Business Solutions
Office 365 Identity Management
Office 365 Identity Management
NetSuite’s Value Propositions
SharePoint Online Authentication Patterns
AD FS Installation Active Directory Federation Services (AD FS) 7.1
James Cowling Senior Technical Architect
M6: Advanced Identity Management topics for Office 365
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Identity and Access Management June 9 – 10, 2016 Jared Galbraith and Andrew Hamilton

IAM Our need to store and access data is growing. Job performance and success is impacted by two systems, what identity and how do you get the access needed. A successful community has a flexible heterogeneous environment. The importance of a safe and easy to use identity environment is essential. The essence of an identity environment is safety and ease? If everyone used the same systems it would be easier to manage but more difficult to fill needs.

Current State of Provisioning

Challenges of Current State Complexity Multiple Accounts and passwords In house Development Primary user portal developer left Maintenance of code has been minimal Manual provisioning Spelling typos, dirty data Only Daily syncs from Banner. Long provisioning times

Self Service – User Portal Netid.unm.edu to claim account Users choice Reset passwords Rigid question/answer is hard to remember Missing SMS verification, One time password etc. Initiates synchronize process Communicates with PUB which pushes the accounts and passwords to AD, LDAP et al.

Admin Portals Netid.unm.edu to admin account User verification Reset passwords High load on service desk LAMB Guest account creation Troubleshooting Audits and Logging Unix groups, quota and home directory Others Support Center/Accounts Office has to use other portals to look up information

Authorization Auto populating groups based on Banner data. Correlations based on external factors should be considered Access Requests Workflow process to bridge the gap Manually configured exports Applications use their own code and process for access. Groups create custom mechanisms. Banner system groups expose basic organizational structure. Convenient web portal allows Banner Access Requests and self service. Lobocloud approvals allow oversight of access activities while decreasing the time to production. Better integration with third party tools would eliminate the need for exposing Banner data via exported files. Less need to create custom processes.

Current Authentication The sprawl shown emphasizes how identities are pulled from disparate repositories. What account and how to request access is different for every environment and application.

Authentication - challenges Direct connections to directories No standard or control No administrator/developer guidance as to what technology to use Multiple authentication portals (CAS, AD FS, Shibboleth) Limited flexibility for new technologies (e.g. missing) OpenID OAUTH 2.0 802.1x PKI Many authentication sources are direct connections to LDAP, AD or databases. Standards and direction should be unified Multiple authentication portals are needed which is confusing and susceptible to social engineering.

Future Directions Exploring implementation of off the shelf products Reduced tools required by support staff Closer Integration with Banner Unified Access portal for Authentication Authorizations based on roles Project started to investigate options

Provisioning – goals On Demand Provisioning Automated and error free Just in Time React to changes in identity sources right away instead of daily reconciliation. Reduce dependence on one person’s knowledge Reduction of in-house customized code/scripts Consume multiple identity sources Better prepared for future enhancements Clean up directories/establish property ownership

Future State of Provisioning

Self-Service Enhancements User portal Commercial off the shelf solution Enhanced security features such as SMS, OTP Integration with provisioning system Admin Portal More granular delegation options Fewer places to look for information

Authorization extensibility User access request for resources Web based portal for delegation and registration Role based modeling Provision resources based on business function Workflow Self-service registration with oversite and management approvals Jobs are ‘what’ makes up the tasks, duties, accountabilities, responsibilities, or objectives of position Roles are ‘how’ behavior can accomplish the ‘what’ Two departments may have very similar job postings but have different behavioral expectations. Periodic confirmation of responsibility

Authorization Modeling Person’s account has the responsibility for ‘owning’ or sponsoring an account. What happens when they leave? Notifications, renewals. We need an organizational entity to take over is that person leaves. Part of InCommon and MS federations. Building our own UNM federation with new hosted services. Interested in building a NM federation to ease collaboration with other schools and partners

Predictive Modeling Unstructured data mining Proactive Design Governance Predictive Modeling Unstructured data mining Proactive Design Role-based behavior is the behavior required to perform a specific role within a specific position/job/function, defined within a specific organizational culture. Does someone suddenly have access to something they shouldn’t? Is your account being used somewhere without your knowledge? Do you know how users store and collaborate with others?

Authentication Goals Reduce direct access to Directory Services (AD/LDAP) Single authentication portal for authentication Provide path to enable future authentication services Increased community collaboration through user groups Eliminate direct binds Establish user forums to illicit community feedback an integrate other needs

Unified Experience Official applications should be accessed through an official eSSO

Questions?