Orchestrating an Identity and Access Management Implementation.

Slides:



Advertisements
Similar presentations
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Advertisements

Pennsylvania BANNER Users Group 2007 Structuring a reporting environment for success.
Campus Security and Identity Management in a Banner World
Global Congress Global Leadership Vision for Project Management.
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Identity Management Choosing and Using Sun’s Identity Management Suite March 13 th, 2007 Kim Tracy Executive Director University Computing Services Northeastern.
1 The Evolving Definition of "Student": Identity Management at Duke University Klara Jelinkova Director, Computing Systems Office of Information Technology.
Federal Student Aid Technical Architecture Initiatives Sandy England
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
July 12, 2005 CSU SIMI Workshop - Melding Policy and Technology to Manage Identity1 Provisioning Services Collaborative CSU, East Bay and CSU, San Bernardino.
Peter Deutsch Director, I&IT Systems July 12, 2005
Wireless Directions University of California, Davis Wireless Technology Team February, 2001.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
COMP8130 and 4130Adrian Marshall 8130 and 4130 Test Management Adrian Marshall.
Identity and Access Management
Access and Identity Management for Enterprise Portals Rohit Gupta Director, Identity Management Product Management Oracle Corporation.
A simpler way to manage identities across multiple services Aldo Zanoni, CEO ext. 232
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Windows XP Migration Jumpstart Offering Offering Datasheet The Challenges With less than one year until the end of support for Windows XP, customer are.
IDENTITY & ACCESS MANAGEMENT TOTAL COST OF OWNERSHIP STUDY Research by independent consultancy Rencana.
Learning with a Purpose: Learning Management Systems Patti Holub, Director District Initiatives and Special Projects Miguel Guhlin, Director Instructional.
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
Aegis Identity Software, Inc. presents Trends in Identity and Access Management in Higher Education to US Federations June 20, 2012 Janet Yarbrough – Director.
Compliance System Validation - An Audit Based Approach December 2012 Uday Gulvadi, CPA, CIA, CISA, CAMS Director - Internal Audit, Risk and Compliance.
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Energy Ecosystem Overview David Miller Chief Security Officer.
Best Practices: Aligning Process, Culture and Tools Michael Jordan Senior Project Manager - Microsoft Consulting Services
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Creating a Networked Learning AND Transaction Environment Duquesne University Ruth Newberry, Director, Educational Technology Sheryl Reinhard, Director,
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
SUNY System Administration Federation Overview Gavin Hogan July 15th, 2009 A work in progress….
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Capture the Movement: Banner 7.0 and Beyond Susan LaCour, Senior Vice President, Solutions Development California Community Colleges Banner Group.
Assessment of Portal Options Presented to: Technology Committee UMS Board of Trustees May 18, 2010.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
EPA Geospatial Segment United States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Segment Architecture.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
SAP Identity Management 7.2 Implementation
Imagining a Community Source Student Services System Leo Fernig Richard Spencer SOA Workshop Vancouver March 24, 2006.
Best Practices for a Successful SaaS Implementation Joseph H. Aston, Oracle Project Lead Velocity Technology Solutions September 18, 2015.
1 Computing and Communications Services ● Business Analysis and Process Re-engineering Gayleen Gray, Deputy CIO.
PRESENTATION TITLE Presented by: Xxxx Xxxxx. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000.
FROM MIT KERBEROS TO MICROSOFT ACTIVE DIRECTORY The Pennsylvania State University’s move from a lower case MIT Kerberos realm to a Standard Microsoft Active.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The UW-Madison IAM Experience Building our Dream Home Presented by Steve Devoti, Senior IT Architect © 2007 Board of Regents of the University of Wisconsin.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Shared Services Initiative Summary of Findings and Next Steps.
Education Portal Solutions for Higher Education Education portals create a common gateway to the data and services that the people throughout your university.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Data Management Program Introduction
Building a National Access Management Infrastructure
Harvard CRM Service Strategy
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
Data, Policy, Stakeholders, and Governance
Presentation transcript:

Orchestrating an Identity and Access Management Implementation

Panel Bruce Taggart Vice Provost, Library & Technology Services Lehigh University Tim Foley Director, Client Services, Library & Technology Services Lehigh University Aaron Perry President APTEC, LLC Moderator: Sara Rodgers Team Leader, Identity & Access Management Lehigh University Bruce Taggart Vice Provost, Library & Technology Services Lehigh University Tim Foley Director, Client Services, Library & Technology Services Lehigh University Aaron Perry President APTEC, LLC Moderator: Sara Rodgers Team Leader, Identity & Access Management Lehigh University

Q & A Getting in tune with Identity and Access Management

What is Identity and Access Management? Q & A

Lehigh’s Focus Knowing who you are (Identity) and providing access to what you need (Access) –Who Relationship, Affiliation or Role Multiple Roles Transitions/Changes –What Electronic Resources Computing Services

Campus Identity & Access Management (“IAM”) Hosted By The University of Mary Washington NOS/DirectoriesOS (Unix) Systems & RepositoriesApplications ERPCRMHRMainframe Auditing and Reporting Workflow and orchestration StudentsFaculty & Staff SOA Applications Affiliates External Delegated Admin SOA Applications Alumni/ Customers Internal Identity Management Service Access Management Authentication & SSO Authorization & RBAC Identity Federation Directory Services LDAP Directory Meta-Directory Virtual Directory Identity Provisioning Who, What, When, Where, Why Rules & access policies Integration framework Identity Administration Delegated Administration Self-Registration & Self-Service User & Group Management Monitoring and Management StudentFac/Staff

Q & A How important is Identity and Access Management? Administrative/ERP/information systems Disaster Recovery/business continuity Funding IT Identity/access management Infrastructure Security

2008 EDUCAUSE Current Issue Survey Ranking from All Institutions on Strategic Importance 1.Security (2) 2.Administrative/ERP/information systems (3) 3.Funding IT (1) 4.Infrastructure (7) 5.Identity/access management (4) 6.Disaster recovery/business continuity (5) 2007 ranking in parentheses

2008 EDUCAUSE Current Issue Survey Ranking from All Institutions on Potential to Become More Significant 1.Identity/access management (2) 2.Security (1) 3.Funding IT (3) 4.Disaster recovery/business continuity (4) 5.Administrative/ERP/information systems (5) 6.Infrastructure (8) 2007 ranking in parentheses

Q & A To what extent is your institution considering or implementing an identity and access management solution? 1.Not considering 2.Currently evaluating 3.Planned, but won’t start within the next 12 months 4.Plan to start within the next 12 months 5.Implementation is in progress 6.Partially operational 7.Fully operational

Q & A Do you have a dedicated Identity and Access Management team/department? What is the scope of responsibilities for your IAM team/dept.? (computing accounts, library systems, ID cards, building access, parking access)

Case Study Prelude Drivers and Objectives Planning and Procedures Lehigh University Case Study Prelude Drivers and Objectives Planning and Procedures

Current Environment Homegrown system Developed & supported by staff with 20+ years of service Adapted & patched over many years

What we typically see at Higher Education Institutions

Challenges and Issues 15 Supportability Administration performed both centrally and locally Manual, paper-driven processes work, but lack audit ability IT staff is stretched, especially as new projects are defined and started Infrastructure support team has a wide range of responsibility with limited means Growth Use of web-based applications continues to grow Increasing demands for new services Need to support within current spending levels Affiliate community is always growing Institutional Culture Priorities may vary on a per school or campus basis Varied and complex user populations Many institutions “bend over backwards” to provide the highest levels of service to their students Typical HE Challenges and Issues Data No single view of identity data across applications Inconsistent user identity data Multiple repositories of user identity data Lack of defined standards for user attributes Many identity owners & sources

Changing Landscape Expansion – users and resources –Portal Implementation (2002) Complexity –Changing roles –Reduce role inflation –Self service options –Single sign-on –Federated identity management Compliance –Federal Acts (FERPA, HIPAA, GLB) –Privacy (under attack!)

Sustainability – standardized, documented Scalability Easier to extend the solution to other key applications and infrastructure Incrementally add functionality such as workflow, approval processes, and attestation Federation Security Foundation for enterprise application framework Additional/more secure authentication methods Rich auditing and reporting capability Objectives Sustainability – standardized, documented Scalability –Easier to extend the solution to other key applications and infrastructure –Incrementally add functionality such as workflow, approval processes, and attestation –Federation Security –Foundation for enterprise application framework –Additional/more secure authentication methods –Rich auditing and reporting capability

Planning and Preparation Buy vs. Build Determine total cost of ownership Select the vendor, consultants Determine staffing and consulting needs Form internal implementation team

Buy vs. Build Availability of products – does something already exist that meets our needs? Long-term strategic goals – scalable solution –Robust - added functionality –Integration with expanding enterprise system (Banner, Luminis, Enrollment Management) Sustainable, standardized solution –Documented and supported Software quality assurance –Tested, proven

Total Cost of Ownership Software Hardware Training Consulting Internal Staff –Staff Dedicated to IAM –Systems Installation/Maintenance –Programming –Data stewards

Why Oracle? Compatibility –System features in line with our needs –Oracle to Oracle (Banner) –OIM can complement our existing IdM. Auditing features were appealing "Adapter Factory" and out-of-the-box connectors

IdM Solution Approach Small, easy to define projects Defined success criteria and requirements Use of proven “off the shelf” products and technologies where appropriate Risk Avoidance Leverage institution’s existing technology base and skills Recommend a solution that is easily expandable to meet future requirements Pragmatism Recommend products that have predictable licensing and support costs Recommend institution’s internal team take ownership and perform tasks where possible Cost Containment Rapid Value Realization Each project provides immediate value and results, which can be leveraged by other institutional initiatives

Case Study - Our Experience

Lehigh University Case Study OIM Implementation in Two Movements

Implementation Phase I –Discovery –Documentation –Design –Role-based provisioning –Interface with authoritative source Phase II –Development –Testing –Deployment

Lehigh University Case Study Concurrent Harmonies & Dissonance

Resistance to change Trust Issues Data Stewards/Managers Programmers and Systems Analysts Cleaning up our act Improve accuracy, completeness & timeliness of data in Banner – our authoritative source Distributed responsibility Analyze business practices & policies Create customized input forms Improve interpretation of data (work with data stewards, stakeholders) Begin attestation (periodic access audits) Challenges Resistance to change Trust Issues –Data Stewards/Managers –Programmers and Systems Analysts Cleaning up our act –Improve accuracy, completeness & timeliness of data in Banner – our authoritative source –Distributed responsibility –Analyze business practices & policies –Create customized input forms –Improve interpretation of data (work with data stewards, stakeholders) –Begin attestation (periodic access audits)

Lessons Learned Communication is key –Involve stakeholders & data stewards –Consensus building –Make sure everyone who will be involved with the implementation has input on the decision. –Involve early You won’t believe what we found –Trace/Document problems –Explain and re-train Push-pull with those you need most Monday morning quarterbacks

What’s Next? Expanding the scope of our IAM to include systems outside of LTS Multifactor authentication Federated identity management

Contact Information Lehigh University: Bruce Taggart – Tim Foley – Sara Rodgers – APTEC, LLC: Aaron Perry -

Use Case

Lehigh Dev and Testing Environment

Production Environment Recommendation Weblogic 10.3

Changes