To learn more about Directory Concepts and how we can help your organisation please contact a Directory Concepts relationship manager near you: Sydney.

Slides:



Advertisements
Similar presentations
ADManager Plus Simplify Your Active Directory Management.
Advertisements

Business Development Suit Presented by Thomas Mathews.
Presentation by Priyanka Sawarkar
© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
Prepared by Dept. of Information Technology & Telecommunication, May 1, 2015 DoITT Identity Management Security, Provisioning, Authentication.
Distributed Capture within a Microsoft Environment.
Active Directory: Final Solution to Enterprise System Integration
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
Understanding Active Directory
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Employee Central Presentation
Identity Management, what does it solve By Gautham Mudra.
1 Alternate Title Slide: Presentation Name Goes Here Presenter’s Name Infrastructure Solutions Division Date GIS Perfct Ltd. Autodesk Value Added Reseller.
Identity and Access Management
Access and Identity Management for Enterprise Portals Rohit Gupta Director, Identity Management Product Management Oracle Corporation.
Train The Trainer Employee Central Administration
Defining Services for Your IT Service Catalog
Understanding Active Directory
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
Accounts Payables Invoice Automation for SharePoint.
Microsoft Identity and Access Solutions Market Trends and Futures
Identity Lifecycle Management Jonny Chambers Senior Technical Specialist Microsoft Ireland
Welcome to the Minnesota SharePoint User Group. Introductions / Overview Project Tracking / Management / Collaboration via SharePoint Multiple Audiences.
Corporate Efficiency Meeting Improving Your Business Processes Using SharePoint and Beyond.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Electronically approve and create Suppliers in Oracle Financials using a combination of APEX and Oracle Workflow. NZOUG Conference 2010 Brad Sayer Team.
Employee Central Administration
Managing Active Directory Domain Services Objects
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Designing Active Directory for Security
What is Sentinel? Sentinel is an innovative printer management solution, designed for organizations who need better control over their printing system.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Novell Nsure TM Identity Manager 2 andGroupWise Provisioning Art Purcell, GroupWise ® Engineering, David Holbrook, DirXML Engineering,
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
Developing Applications for SSO Justen Stepka Authentisoft, LLC
© 2008 IBM Corporation ® IBM Cognos Business Viewpoint Miguel Garcia - Solutions Architect.
Module 7 Active Directory and Account Management.
Project 2003 Presentation Ben Howard 15 th July 2003.
Riva Managed Identity Integration for Active Directory and Novell ® GroupWise ® Aldo Zanoni CEO, Managing Director Omni Technology Solutions
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Erie 1 BOCES / WNYRIC eBOCES applications Visit us at:
Windows Role-Based Access Control Longhorn Update
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
Altman IM Ltd | | process | verify | convert | route | connect Prism Software’s solutions provide advanced workflow.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Federico Guerrini IDA TSP, EMEA Incubation Team From Identity Synchronization to Identity Management.
2015 NetSymm Overview NETSYMM OVERVIEW December
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Microsoft Identity Integration Server & Role Base Access Theo Kostelijk Consultant Microsoft BV
Momentum. Strategy & Roadmapping Business Analysis Information Architecture Usability / User Experience Rich Media Social Media (Web 2.0) Interface Design.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
Automating Mainframe Authentication Using SecureLogin
Identity Management at the University of Florida
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

To learn more about Directory Concepts and how we can help your organisation please contact a Directory Concepts relationship manager near you: Sydney Melbourne Brisbane Wellington National Support: or

Using an organisation’s identity information to enable TRIM

Agenda Introduction Identity Lifecycle Management Integrating TRIM

Who are Directory Concepts? Offices Brisbane, Sydney, Melbourne and Wellington 6o+ technical staff across these locations 10 years speciality in identity driven solutions Platinum partner status with Novell Technical staff are recognised in the industry as maintaining the deepest identity specialty skill set in the Asia Pacific region Consult and support to government on identity and access management across the region

DC Offerings Consulting Services Architecture Consultancy Business analysis Design Project management Professional Services Project build and deploy Post project support Specialty managed services 24 x 7 helpdesk services Contract onsite services

Introductions My background? ─ Software Development (corporate and startup) ─ Experience in Education, Financial and Government sectors ─ Head of Development Vertical at Directory Concepts

Information Management (IM) Documents Identities Identity Management (IDM)

Identity Lifecycle Management What does it promise? ─ Automation of the process to manage access rights from the day a user is hired until the day they leave the organisation ─ Consistent and accurate information and access rights across all connected systems So what is it?

Identity Lifecycle Management

Key Elements of Identity Management Identity Integration Roles management Integrated workflows and provisioning policies Self Service

Identity Integration Roles management Integrated workflows and provisioning policies Self Service Key Elements of Identity Management

Business Issue: Your Enterprise has many Identity Stores Human Resources Network/NOS Directory Enterprise Application PBX Identity Stores Many of your Enterprise’s applications own a piece of the User's Identity. This Identity data can be expensive to maintain. The Data may not be shared by everyone who needs it. This Data may not be accurate, consistent or kept up to date.

Novell's Solution: Create a Central Identity Vault Human Resources Network/NOS Directory Enterprise Application PBX Identity Stores Identity Isolation problems can be solved by creating an Identity Vault. A location for centralized identity management Many applications share the same identity data and authentication and authorization functionality Lays foundation for access control Provides basis for role-based personalization based on rights Identity Vault

The Solution: Advanced Identity Synchronization Human Resources Network/NOS Directory Enterprise Application PBX Identity Stores In order to aggregate this identity data into the Identity Vault we utilize Identity Synchronization technology. This allows you to utilize data owned by many systems to create a single rich identity It allows for distributed ownership of portions of an identity, while allowing a single, centralized identity that can be leveraged by a myriad of systems. Identity Vault

Distributed Ownership of Data a centralized view Help Desk System System File & Print PBX HR System Identity Vault Address First Name Last Name Employee ID Address Location Phone Number Network Address First Name Last Name Location Address First Name Last Name First Name Last Name Location First Name Last Name Employee ID Location User ID

Novell IDM Application Coverage

Key Elements of Identity Management Identity Integration Roles management Integrated workflows and provisioning policies Self Service

Roles Management Maps Business Roles to IT Entitlements Assign users to Roles based on business policies and an exception approval process

Novell Solution: Roles Based Provisioning Module Role represents business function/position Business and user centric (authorisation workflows) Assign resources to roles and then assign the roles to the users or groups or organisational units (Inheritance) Delegation Separation of duties

Novell Identity Manager Roles Based Provisioning Module 20 Integrated Roles Management & Workflow

Key Elements of Identity Management Identity Integration Roles management Integrated workflows and provisioning policies Self Service

Novell Solution: Automated Provisioning Human Resources Network/NOS Directory Enterprise Application Financial Application Identity Stores In order to give user's access to the resources they need we utilize dynamic provisioning capabilities. This allows Identity Manager to capture events that occur in an authoritative system such as an HR system The Identity Management system provisions user in realtime based on policies Identity Vault Policies HR Personnel

Novell Solution: Workflow Based Provisioning Human Resources Network/NOS Directory Enterprise Application Financial Application Identity Stores In situations where access to resources should require approval, a user facing provisioning environment is created. Users only see the resources that they can request based on their Identity Policies determine who should approve access to the resource Identity Vault Policies User Application User User's Manager

Novell Solution: Workflow Based Provisioning Human Resources Network/NOS Directory Enterprise Application Financial Application Identity Stores The Manager can access the Provisioning User Application. Here the manager can deny or approve the request Access is Granted immediately Identity Vault Policies User Application User User's Manager

Workflows - simple

Workflow Features Highly flexible ─ Can be as simple or complex as desired Time-outs and escalation Third-party integration (SOAP/Web Services) ─ Generate service desk tickets Can be user initiated or automatically initiated Customisable forms

Business Process Automation

Key Elements of Identity Management Identity Integration Roles management Integrated workflows and provisioning policies Self Service

End Users: typical issues Unfavourable user experience ─ Required to call service desk ─ “I have too many passwords” Service desk over-utilisation ─ Password resets ─ Simple requests (file access etc.) Security ─ Users creating their own credential store Lost productivity

Case Study Organisation with 2000 users ─ 3592 password resets (forgotten/expired) ─ 1162 requests for additional access 3592 password resets pa ─ Gartner: ~25AUD (22USD) for each password reset ─ 3592 x 25 = $89,800* pa 1162 file access requests pa ─ ~15 minutes to complete each request ─ 1162 x 15 = minutes = 290 hrs = 36 days * Does not account for lost productivity

User Application Web-based interface to display and allow users to view and manage identity data in the identity vault. – Organization Charts – White Pages – Profile management – Password management

Novell ® Identity Manager Novell Identity Manager delivers: User Provisioning Roles Based Access Control Identity Integration Password Management Delegated Administration/Self Service Automated workflows (both data driven and approval driven) Databases GroupWise PeopleSoft LDAP Directories Mainframes Windows Server BMC Remedy Notes Avaya PBX Administer my resources or workgroup Search / browse users or resources Request access to resources Recover forgotten password Self-administration Approved Identity and provisioning environment Identity Vault

Identity Manager Reach global customers Tighter supplier relationships More productive partnerships Consistent security policy Immediate system-wide access updates Consistent identity data Automated risk mitigation Enterprise SoD Eliminate redundant administration tasks Reduce helpdesk burden Fast employee ramp-up User self service Focused, personalized content Delegated Administration Comprehensive profile view Password management Identity Management SOD requirements Role-based access Least privilege access Real-time visibility and disclosure Basic compliance reporting Business Facilitation Governance & Security Increased Productivity & Cost Reduction Regulatory Compliance Increase Service Level Allow the enterprise to address Pain Points and business initiatives from the IT Manager to the CxO

Integration with HP TRIM Connecting Translating Access Control

Connecting User Lifecycle Integration ─ Indirect Database Staging Table ─ Direct Web Services via SOAP Connector –Stateless Custom IDM Connector –“Stateful” –Bi-directional

Translating Mapping LDAP Classes to TRIM Locations ClassLocation UserPerson GroupGroup/Project Team/Workgroup Organizational UnitOrganization

Managing Locations Create, Update and Delete ─ Persons ─ Workgroups ─ Organisational Units

Access Control Some Options ─ Minimal rights initially, manually adjusted by TRIM administrator ─ Based on Org Unit, Group membership, other identity attribute ─ Configurable via On-Boarding application

Case Study Government Department in Victoria Involves multiple systems Simple workflow via ‘Best guess’ for access based on Org Unit then modified/approved by TRIM administrator

Conclusion IDM integrated with TRIM can ─ Reduce the cost of managing user and access management ─ Provide timely and secure access to services like TRIM ─ Increase business leaders trust in IT, in regard to compliance ─ Reduce the risk of human error ─ Strengthen security without raising costs or diminishing productivity

Questions?

Directory Concepts Come and visit us if you have any further questions or would like more information on Identity Management